<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ToDesk.app — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/todesk.app/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 16:08:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/todesk.app/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious macOS MS Office Child Process</title><link>https://feed.craftedsignal.io/briefs/2026-05-suspicious-office-child-macos/</link><pubDate>Mon, 11 May 2026 16:08:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-suspicious-office-child-macos/</guid><description>This rule identifies suspicious child processes of Microsoft Office applications on macOS, which often result from exploitation or malicious macros, by detecting unexpected processes like curl, bash, osascript, and python spawned by Office apps, while filtering out false positives related to product version discovery, error reporting, and legitimate software.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious child processes spawned by Microsoft Office applications (Word, PowerPoint, Excel, Outlook, and OneNote) on macOS systems. Attackers often exploit Office applications through malicious macros or document vulnerabilities to execute arbitrary code. This technique allows them to gain an initial foothold on the system. The rule focuses on detecting the execution of scripting languages and system utilities such as <code>curl</code>, <code>bash</code>, <code>osascript</code>, and <code>python</code> as child processes of Office applications, indicating potential malicious activity. The rule logic incorporates filters to reduce false positives related to legitimate software behavior and system administration tasks. The rule was last updated on 2026/05/07 and requires Elastic Defend for data collection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user opens a malicious document (e.g., Word, Excel) received via spearphishing (T1566.001).</li>
<li>The document contains a malicious macro or exploits a vulnerability in the Office application (T1203, T1204.002).</li>
<li>Upon execution, the macro or exploit triggers the Office application to execute a shell command (T1059.004).</li>
<li>The shell command executes a scripting interpreter like <code>/bin/bash</code> or <code>/usr/bin/python</code> to run malicious code (T1059.004, T1059.006).</li>
<li>The malicious code downloads additional payloads or executes system commands using utilities like <code>curl</code> or <code>osascript</code>.</li>
<li>The attacker gains initial access to the system and can perform further actions such as reconnaissance or persistence.</li>
<li>The attacker may use <code>plutil</code> or <code>PlistBuddy</code> to modify system configuration files.</li>
<li>The attacker may use <code>xattr</code> to remove file quarantine attributes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to install malware, steal sensitive information, or perform other malicious activities. The targeted applications are widely used in enterprise environments, making this a potentially high-impact threat. Although the rule does not specify the number of affected organizations or incidents, the widespread use of Microsoft Office applications on macOS means many systems are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided EQL rule to your Elastic Security environment to detect suspicious child processes of MS Office applications on macOS (rule).</li>
<li>Enable Elastic Defend with the &ldquo;Complete EDR (Endpoint Detection and Response)&rdquo; configuration setting to ensure required data is collected (setup).</li>
<li>Review and tune the rule&rsquo;s filter conditions based on your organization&rsquo;s environment to minimize false positives, paying attention to the processes and arguments listed in the rule query (query).</li>
<li>Implement application control policies to restrict the execution of unauthorized scripting languages and utilities to prevent exploitation through Office applications (rule).</li>
<li>Educate users about the risks of opening suspicious attachments and enabling macros in Office documents (T1566.001, T1204.002).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>endpoint</category><category>macos</category><category>initial_access</category><category>microsoft_office</category></item></channel></rss>