Attempt to Install Root Certificate

Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to their command and control servers. Root certificates are used in public key cryptography to identify a root certificate authority (CA). When a root certificate is installed, the system or application will trust certificates in the root's chain of trust that have been signed by the root certificate.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2021/01/13"
 3integration = ["endpoint"]
 4maturity = "production"
 5min_stack_comments = "New fields added: required_fields, related_integrations, setup"
 6min_stack_version = "8.3.0"
 7updated_date = "2023/06/22"
 8
 9[rule]
10author = ["Elastic"]
11description = """
12Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to their command
13and control servers. Root certificates are used in public key cryptography to identify a root certificate authority
14(CA). When a root certificate is installed, the system or application will trust certificates in the root's chain of
15trust that have been signed by the root certificate.
16"""
17false_positives = ["Certain applications may install root certificates for the purpose of inspecting SSL traffic."]
18from = "now-9m"
19index = ["auditbeat-*", "logs-endpoint.events.*"]
20language = "kuery"
21license = "Elastic License v2"
22name = "Attempt to Install Root Certificate"
23references = ["https://ss64.com/osx/security-cert.html"]
24risk_score = 47
25rule_id = "bc1eeacf-2972-434f-b782-3a532b100d67"
26severity = "medium"
27tags = ["Domain: Endpoint", "OS: macOS", "Use Case: Threat Detection", "Tactic: Defense Evasion", "Data Source: Elastic Defend"]
28timestamp_override = "event.ingested"
29type = "query"
30
31query = '''
32event.category:process and host.os.type:macos and event.type:(start or process_started) and
33  process.name:security and process.args:"add-trusted-cert" and
34  not process.parent.executable:("/Library/Bitdefender/AVP/product/bin/BDCoreIssues" or "/Applications/Bitdefender/SecurityNetworkInstallerApp.app/Contents/MacOS/SecurityNetworkInstallerApp"
35)
36'''
37
38
39[[rule.threat]]
40framework = "MITRE ATT&CK"
41[[rule.threat.technique]]
42id = "T1553"
43name = "Subvert Trust Controls"
44reference = "https://attack.mitre.org/techniques/T1553/"
45[[rule.threat.technique.subtechnique]]
46id = "T1553.004"
47name = "Install Root Certificate"
48reference = "https://attack.mitre.org/techniques/T1553/004/"
49
50
51
52[rule.threat.tactic]
53id = "TA0005"
54name = "Defense Evasion"
55reference = "https://attack.mitre.org/tactics/TA0005/"

References

Related rules

to-top