Rule Library

Sigma Rules

70 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Potential Discovery Activity Using Find - MacOS

Detects usage of "find" binary in a suspicious manner to perform discovery

macOSProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28macos
Detectionmediumtest

Suspicious History File Operations

Detects commandline operations on shell history files

macOSProcess Creation
TA0006 · Credential AccessT1552.003 · Bash History
Mikhail Larin+1Sat Oct 17macos
Detectionmediumtest

Potential In-Memory Download And Compile Of Payloads

Detects potential in-memory downloading and compiling of applets using curl and osacompile as seen used by XCSSET malware

macOSProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1059.007 · JavaScriptT1105 · Ingress Tool Transfer
Sohan G (D4rkCiph3r)+1Tue Aug 22macos
Detectionmediumtest

Suspicious MacOS Firmware Activity

Detects when a user manipulates with Firmward Password on MacOS. NOTE - this command has been disabled on silicon-based apple computers.

macOSProcess Creation
TA0040 · Impact
Austin SongerThu Sep 30macos
Detectioninformationaltest

System Network Discovery - macOS

Detects enumeration of local network configuration

macOSProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
remotephone+1Tue Oct 06macos
Detectionmediumtest

System Information Discovery Using sw_vers

Detects the use of "sw_vers" for system information discovery

macOSProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Joseliyo SanchezWed Dec 20macos
Detectionmediumtest

User Added To Admin Group Via Sysadminctl

Detects attempts to create and add an account to the admin group via "sysadminctl"

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Sun Mar 19macos
Detectionlowtest

Guest Account Enabled Via Sysadminctl

Detects attempts to enable the guest account using the sysadminctl utility

macOSProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+2
Sohan G (D4rkCiph3r)Sat Feb 18macos
Detectionmediumtest

System Information Discovery Via Sysctl - MacOS

Detects the execution of "sysctl" with specific arguments that have been used by threat actors and malware. It provides system hardware information. This process is primarily used to detect and avoid virtualization and analysis environments.

macOSProcess Creation
TA0005 · Defense EvasionT1497.001 · System ChecksTA0007 · DiscoveryT1082 · System Information Discovery
Pratinav ChandraMon May 27macos
Detectioninformationaltest

System Network Connections Discovery - MacOs

Detects usage of system utilities to discover system network connections

macOSProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections Discovery
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionmediumtest

System Information Discovery Using System_Profiler

Detects the execution of "system_profiler" with specific "Data Types" that have been seen being used by threat actors and malware. It provides system hardware and software configuration information. This process is primarily used for system information discovery. However, "system_profiler" can also be used to determine if virtualization software is being run for defense evasion purposes.

macOSProcess Creation
TA0007 · DiscoveryTA0005 · Defense EvasionT1082 · System Information DiscoveryT1497.001 · System Checks
Stephen Lincoln (AttackIQ)Tue Jan 02macos
Detectioninformationaltest

System Shutdown/Reboot - MacOs

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.

macOSProcess Creation
TA0040 · ImpactT1529 · System Shutdown/Reboot
Igor Fits+2Mon Oct 19macos
Detectionhightest

Potential Base64 Decoded From Images

Detects the use of tail to extract bytes at an offset from an image and then decode the base64 value to create a new file with the decoded content. The detected execution is a bash one-liner.

macOSProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Joseliyo SanchezWed Dec 20macos
Detectionmediumtest

Time Machine Backup Deletion Attempt Via Tmutil - MacOS

Detects deletion attempts of MacOS Time Machine backups via the native backup utility "tmutil". An adversary may perform this action before launching a ransonware attack to prevent the victim from restoring their files.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

Time Machine Backup Disabled Via Tmutil - MacOS

Detects disabling of Time Machine (Apple's automated backup utility software) via the native macOS backup utility "tmutil". An attacker can use this to prevent backups from occurring.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

New File Exclusion Added To Time Machine Via Tmutil - MacOS

Detects the addition of a new file or path exclusion to MacOS Time Machine via the "tmutil" utility. An adversary could exclude a path from Time Machine backups to prevent certain files from being backed up.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionhightest

Potential WizardUpdate Malware Infection

Detects the execution traces of the WizardUpdate malware. WizardUpdate is a macOS trojan that attempts to infiltrate macOS machines to steal data and it is associated with other types of malicious payloads, increasing the chances of multiple infections on a device.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Detectionlowtest

Gatekeeper Bypass via Xattr

Detects macOS Gatekeeper bypass via xattr utility

macOSProcess Creation
TA0005 · Defense EvasionT1553.001 · Gatekeeper Bypass
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionmediumtest

Potential XCSSET Malware Infection

Identifies the execution traces of the XCSSET malware. XCSSET is a macOS trojan that primarily spreads via Xcode projects and maliciously modifies applications. Infected users are also vulnerable to having their credentials, accounts, and other vital data stolen.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Emerging Threathighexperimental

Atomic MacOS Stealer - FileGrabber Activity

Detects suspicious activity associated with Atomic MacOS Stealer (Amos) campaigns, including execution of FileGrabber and curl-based POST requests used for data exfiltration. The rule identifies either the execution of FileGrabber targeting /tmp or the use of curl to POST sensitive user data (including files such as /tmp/out.zip) to remote servers, which are key indicators of Amos infostealer activity.

macOSProcess Creation
TA0002 · ExecutionT1059.002 · AppleScriptdetection.emerging-threats
Jason Phang Vern - Onn+1Sat Nov 222025
Emerging Threathighexperimental

Axios NPM Compromise Indicators - macOS

Detects the macOS-specific execution chain of the plain-crypto-js malicious npm dependency in Axios NPM Package, including AppleScript execution via osascript, payload download, permission modification, execution, and cleanup.

macOSProcess Creation
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0002 · ExecutionTA0011 · Command and Control+5
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Threat Huntmediumtest

Clipboard Data Collection Via Pbpaste

Detects execution of the "pbpaste" utility, which retrieves the contents of the clipboard (a.k.a. pasteboard) and writes them to the standard output (stdout). The utility is often used for creating new files with the clipboard content or for piping clipboard contents to other commands. It can also be used in shell scripts that may require clipboard content as input. Attackers can abuse this utility in order to collect data from the user clipboard, which may contain passwords or sensitive information. Use this rule to hunt for potential abuse of the utility by looking at the parent process and any potentially suspicious command line content.

macOSProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1115 · Clipboard Datadetection.threat-hunting
Daniel CortezTue Jul 30macos