Spike in Bytes Sent to an External Device via Airdrop
A machine learning job has detected a spike in bytes of data written to an external device via Airdrop, potentially indicating illicit data copying or transfer activities.
This detection identifies potential data exfiltration attempts via Apple’s Airdrop feature. A machine learning job monitors the volume of data transferred to external devices and flags unusual spikes. While Airdrop facilitates legitimate file sharing between Apple devices, it can be abused by malicious actors to exfiltrate sensitive data. This rule leverages the “ded_high_bytes_written_to_external_device_airdrop_ea” machine learning job and requires the Data Exfiltration Detection integration to be installed, along with network and file events collected by Elastic Defend and Network Packet Capture (for network events only). The rule is designed to detect anomalies in data transfer patterns, providing early warning of potential data breaches.
Attack Chain
- Attacker gains initial access to a macOS system within the target network.
- Attacker identifies sensitive data stored on the compromised system.
- Attacker uses Airdrop to initiate a transfer of the identified data to a nearby device.
- The receiving device is controlled by the attacker and configured to accept Airdrop transfers.
- A large volume of data is transferred via Airdrop, triggering the machine learning detection.
- The data is received by the attacker, completing the exfiltration process.
- The attacker may attempt to cover their tracks by deleting files or logs related to the Airdrop transfer.
Impact
Successful exploitation can lead to the unauthorized disclosure of sensitive data. The impact depends on the nature of the exfiltrated data, potentially leading to financial loss, reputational damage, or legal repercussions. The severity is relatively low as it depends on the data being transferred.
Recommendation
- Install the Data Exfiltration Detection integration in Elastic, including the preconfigured anomaly detection jobs, as required by the rule setup instructions to enable the machine learning detection (Data Exfiltration Detection integration).
- Investigate alerts generated by the “Spike in Bytes Sent to an External Device via Airdrop” rule, focusing on identifying the involved device, user, and the nature of the transferred data (Spike in Bytes Sent to an External Device via Airdrop).
- Implement additional monitoring on the affected device and similar devices to detect any further anomalous Airdrop activities, as mentioned in the response and remediation steps (Spike in Bytes Sent to an External Device via Airdrop).
Detection coverage 2
Detect Airdrop Usage via Process Creation
infoDetects the execution of the Airdrop process on macOS, which can be indicative of file transfers.
Detect Airdrop Transfer via Network Connection
lowDetects network connections associated with Airdrop file transfers by monitoring for specific port or protocol usage.
Detection queries are kept inside the platform. Get full rules →