[metadata] creation_date = "2021/01/05" maturity = "production" updated_date = "2021/03/09" [rule] author = ["Elastic"] description = """ Identifies the use of the built-in networksetup command to configure webproxy settings. This may indicate an attempt to hijack web browser traffic for credential access via traffic sniffing or redirection. """ false_positives = ["Legitimate WebProxy Settings Modification"] from = "now-9m" index = ["auditbeat-*", "logs-endpoint.events.*"] language = "kuery" license = "Elastic License v2" name = "WebProxy Settings Modification" references = [ "https://unit42.paloaltonetworks.com/mac-malware-steals-cryptocurrency-exchanges-cookies/", "https://objectivebythesea.com/v2/talks/OBTS_v2_Zohar.pdf", ] risk_score = 47 rule_id = "10a500bb-a28f-418e-ba29-ca4c8d1a9f2f" severity = "medium" tags = ["Elastic", "Host", "macOS", "Threat Detection", "Credential Access"] timestamp_override = "event.ingested" type = "query" query = ''' event.category : process and event.type : start and process.name : networksetup and process.args : (("-setwebproxy" or "-setsecurewebproxy" or "-setautoproxyurl") and not (Bluetooth or off)) and not process.parent.executable : ("/Library/PrivilegedHelperTools/com.80pct.FreedomHelper" or "/Applications/Fiddler Everywhere.app/Contents/Resources/app/out/WebServer/Fiddler.WebUi" or "/usr/libexec/xpcproxy") ''' [[rule.threat]] framework = "MITRE ATT&CK" [[rule.threat.technique]] id = "T1539" name = "Steal Web Session Cookie" reference = "https://attack.mitre.org/techniques/T1539/" [rule.threat.tactic] id = "TA0006" name = "Credential Access" reference = "https://attack.mitre.org/tactics/TA0006/"