<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Jamf — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/jamf/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 26 Oct 2024 20:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/jamf/feed.xml" rel="self" type="application/rss+xml"/><item><title>macOS User Added to Admin Group Detection</title><link>https://feed.craftedsignal.io/briefs/2024-10-macos-admin-group-privilege-escalation/</link><pubDate>Sat, 26 Oct 2024 20:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-macos-admin-group-privilege-escalation/</guid><description>The rule identifies when a user is added to the admin group on macOS systems, potentially indicating privilege escalation activity, and requires Jamf Protect for data ingestion into Elastic.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of users being added to the &lsquo;admin&rsquo; group on macOS systems. This is a critical security concern, as it can be indicative of privilege escalation attempts by malicious actors or unauthorized users. The rule is designed to function with data ingested from Jamf Protect into the Elastic Security platform, providing a means to detect this specific type of activity within macOS environments. The rule was last updated in May 2026 and leverages EQL for its detection logic. By monitoring for these events, security teams can quickly identify and respond to potential privilege escalation attempts, mitigating the risk of unauthorized access and control over macOS systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user with sufficient privileges executes a command-line tool like <code>dscl</code> to modify group membership.</li>
<li>The <code>dscl</code> command targets the local directory service to modify the &ldquo;admin&rdquo; group.</li>
<li>The command adds a specific username to the list of members of the &ldquo;admin&rdquo; group.</li>
<li>The operating system processes the directory service modification request and updates group membership.</li>
<li>The system logs the event as a change to group membership, specifically &ldquo;od_group_add&rdquo; for the &ldquo;admin&rdquo; group.</li>
<li>Jamf Protect detects this event and forwards the telemetry to the Elastic platform.</li>
<li>The Elastic detection rule triggers based on the received event data.</li>
<li>An alert is generated, prompting security analysts to investigate potential privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful privilege escalation can grant an attacker complete control over the affected macOS system. This can lead to unauthorized data access, modification, or deletion, as well as the installation of malware or other malicious software. While the risk score is relatively low (21), the potential impact of a successful attack necessitates monitoring for this behavior. Post-privilege escalation, attackers can establish persistence, install software, create new user accounts, or perform lateral movement within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Configure Jamf Protect to forward macOS endpoint events to the Elastic platform to enable the detections in this brief.</li>
<li>Deploy the Sigma rule <code>macOS User Added to Admin Group via dscl</code> to detect potential privilege escalation attempts.</li>
<li>Investigate any alerts generated by this rule by reviewing the actions taken by the affected user immediately after being added to the admin group, looking for persistence mechanisms or unauthorized software installs.</li>
<li>Use the provided investigation queries in the rule&rsquo;s metadata to find related events from the host or parent process.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privilege-escalation</category><category>macos</category><category>jamf</category></item></channel></rss>