sigma
sigma copied to clipboard
New Rule: proc_creation_macos_sysctl_discovery.yml
Summary of the Pull Request
Added a new rule to detect execution of sysctl
on macOS.
-
sysctl
can be used to gather interesting macOS host data, including hardware information, memory size, logical cpu information, etc. - It has been used in the past by threat actors to determine whether the target macOS host is running on a physical or virtual machine and also for system information discovery.
Example Usage in the wild:
Changelog
New: MacOS System Discovery Using Sysctl
Example Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions
- If your PR adds new rules, please consider following and applying these conventions
@nasbench Any progress on this? Is there anything else needed from my end?
Nothing needed from your side. Will get to this PR soon enough:)