mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-06 17:35:19 +00:00
28 lines
981 B
YAML
28 lines
981 B
YAML
title: Suspicious MacOS Firmware Activity
|
|
id: 7ed2c9f7-c59d-4c82-a7e2-f859aa676099
|
|
status: experimental
|
|
description: Detects when a user manipulates with Firmward Password on MacOS. NOTE - this command has been disabled on silicon-based apple computers.
|
|
author: Austin Songer @austinsonger
|
|
date: 2021/09/30
|
|
references:
|
|
- https://github.com/usnistgov/macos_security/blob/932a51f3e819dd3e02ebfcf3ef433cfffafbe28b/rules/os/os_firmware_password_require.yaml
|
|
- https://www.manpagez.com/man/8/firmwarepasswd/
|
|
- https://support.apple.com/guide/security/firmware-password-protection-sec28382c9ca/web
|
|
logsource:
|
|
category: process_creation
|
|
product: macos
|
|
detection:
|
|
selection1:
|
|
Image: '/usr/sbin/firmwarepasswd'
|
|
CommandLine|contains:
|
|
- 'setpasswd'
|
|
- 'full'
|
|
- 'delete'
|
|
- 'check'
|
|
condition: selection1
|
|
falsepositives:
|
|
- Legitimate administration activities
|
|
level: medium
|
|
tags:
|
|
- attack.impact
|