WebProxy Settings Modification
Identifies the use of the built-in networksetup command to configure webproxy settings. This may indicate an attempt to hijack web browser traffic for credential access via traffic sniffing or redirection.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2021/01/05"
3integration = ["endpoint"]
4maturity = "production"
5min_stack_comments = "New fields added: required_fields, related_integrations, setup"
6min_stack_version = "8.3.0"
7updated_date = "2023/06/22"
8
9[rule]
10author = ["Elastic"]
11description = """
12Identifies the use of the built-in networksetup command to configure webproxy settings. This may indicate an attempt to
13hijack web browser traffic for credential access via traffic sniffing or redirection.
14"""
15false_positives = ["Legitimate WebProxy Settings Modification"]
16from = "now-9m"
17index = ["auditbeat-*", "logs-endpoint.events.*"]
18language = "kuery"
19license = "Elastic License v2"
20name = "WebProxy Settings Modification"
21references = [
22 "https://unit42.paloaltonetworks.com/mac-malware-steals-cryptocurrency-exchanges-cookies/",
23 "https://objectivebythesea.com/v2/talks/OBTS_v2_Zohar.pdf",
24]
25risk_score = 47
26rule_id = "10a500bb-a28f-418e-ba29-ca4c8d1a9f2f"
27severity = "medium"
28tags = ["Domain: Endpoint", "OS: macOS", "Use Case: Threat Detection", "Tactic: Credential Access", "Data Source: Elastic Defend"]
29timestamp_override = "event.ingested"
30type = "query"
31
32query = '''
33event.category:process and host.os.type:macos and event.type:start and
34 process.name : networksetup and process.args : (("-setwebproxy" or "-setsecurewebproxy" or "-setautoproxyurl") and not (Bluetooth or off)) and
35 not process.parent.executable : ("/Library/PrivilegedHelperTools/com.80pct.FreedomHelper" or
36 "/Applications/Fiddler Everywhere.app/Contents/Resources/app/out/WebServer/Fiddler.WebUi" or
37 "/usr/libexec/xpcproxy")
38'''
39
40
41[[rule.threat]]
42framework = "MITRE ATT&CK"
43[[rule.threat.technique]]
44id = "T1539"
45name = "Steal Web Session Cookie"
46reference = "https://attack.mitre.org/techniques/T1539/"
47
48
49[rule.threat.tactic]
50id = "TA0006"
51name = "Credential Access"
52reference = "https://attack.mitre.org/tactics/TA0006/"
References
Related rules
- Access of Stored Browser Credentials
- Access to Keychain Credentials Directories
- Dumping Account Hashes via Built-In Commands
- Dumping of Keychain Content via Security Command
- Kerberos Cached Credentials Dumping