New

The executive guide to generative AI

Read more

Finder Sync Plugin Registered and Enabled

edit

Finder Sync plugins enable users to extend Finder’s functionality by modifying the user interface. Adversaries may abuse this feature by adding a rogue Finder Plugin to repeatedly execute malicious payloads for persistence.

Rule type: eql

Rule indices:

  • auditbeat-*
  • logs-endpoint.events.*

Severity: medium

Risk score: 47

Runs every: 5 minutes

Searches indices from: now-9m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

References:

Tags:

  • Elastic
  • Host
  • macOS
  • Threat Detection
  • Persistence

Version: 2 (version history)

Added (Elastic Stack release): 7.12.0

Last modified (Elastic Stack release): 7.15.0

Rule authors: Elastic

Rule license: Elastic License v2

Potential false positives

edit

Trusted Finder Sync Plugins

Rule query

edit
sequence by host.id, user.id with maxspan = 5s [process where
event.type in ("start", "process_started") and process.name :
"pluginkit" and process.args : "-a"] [process where event.type in
("start", "process_started") and process.name : "pluginkit" and
process.args : "-e" and process.args : "use" and process.args : "-i"
and not process.args : (
"com.google.GoogleDrive.FinderSyncAPIExtension",
"com.google.drivefs.findersync", "com.boxcryptor.osx.Rednif",
"com.adobe.accmac.ACCFinderSync",
"com.microsoft.OneDrive.FinderSync",
"com.insynchq.Insync.Insync-Finder-Integration",
"com.box.desktop.findersyncext" ) ]

Threat mapping

edit

Framework: MITRE ATT&CKTM

Rule version history

edit
Version 2 (7.15.0 release)
  • Formatting only
Was this helpful?
Feedback