IMPORTANT: No additional bug fixes or documentation updates
will be released for this version. For the latest information, see the
current release documentation.
Finder Sync Plugin Registered and Enabled
edit
IMPORTANT: This documentation is no longer updated. Refer to Elastic's version policy and the latest documentation.
Finder Sync Plugin Registered and Enabled
editFinder Sync plugins enable users to extend Finder’s functionality by modifying the user interface. Adversaries may abuse this feature by adding a rogue Finder Plugin to repeatedly execute malicious payloads for persistence.
Rule type: eql
Rule indices:
- auditbeat-*
- logs-endpoint.events.*
Severity: medium
Risk score: 47
Runs every: 5m
Searches indices from: now-9m (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
References:
Tags:
- Elastic
- Host
- macOS
- Threat Detection
- Persistence
Version: 101
Rule authors:
- Elastic
Rule license: Elastic License v2
Rule query
editprocess where event.type in ("start", "process_started") and process.name : "pluginkit" and process.args : "-e" and process.args : "use" and process.args : "-i" and not process.args : ( "com.google.GoogleDrive.FinderSyncAPIExtension", "com.google.drivefs.findersync", "com.boxcryptor.osx.Rednif", "com.adobe.accmac.ACCFinderSync", "com.microsoft.OneDrive.FinderSync", "com.insynchq.Insync.Insync-Finder-Integration", "com.box.desktop.findersyncext" ) and not process.parent.executable : ( "/Library/Application Support/IDriveforMac/IDriveHelperTools/FinderPluginApp.app/Contents/MacOS/FinderPluginApp" )
Framework: MITRE ATT&CKTM
-
Tactic:
- Name: Persistence
- ID: TA0003
- Reference URL: https://attack.mitre.org/tactics/TA0003/
-
Technique:
- Name: Create or Modify System Process
- ID: T1543
- Reference URL: https://attack.mitre.org/techniques/T1543/
Was this helpful?
Thank you for your feedback.