<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Boxcryptor — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/boxcryptor/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 12:34:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/boxcryptor/feed.xml" rel="self" type="application/rss+xml"/><item><title>macOS Finder Sync Plugin Persistence via Pluginkit</title><link>https://feed.craftedsignal.io/briefs/2026-05-finder-sync-plugin-persistence/</link><pubDate>Mon, 18 May 2026 12:34:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-finder-sync-plugin-persistence/</guid><description>This rule detects suspicious Finder Sync plugin registrations on macOS, where adversaries abuse the pluginkit process to establish persistence by repeatedly executing malicious payloads.</description><content:encoded><![CDATA[<p>Finder Sync plugins extend the functionality of macOS Finder, allowing users to modify the user interface. Adversaries may abuse this feature by adding a rogue Finder Plugin to repeatedly execute malicious payloads for persistence. The <code>pluginkit</code> command is used to manage these plugins. This rule identifies suspicious plugin registrations by monitoring the <code>pluginkit</code> process and filtering out known safe applications, flagging unusual activity to help analysts spot potential threats. Legitimate applications like Google Drive, Boxcryptor, Adobe Creative Cloud, Microsoft OneDrive, Insync, and Box can utilize these plugins, so identifying malicious use is critical.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user installs a malicious application or unknowingly executes a script that contains instructions to install a malicious Finder Sync plugin.</li>
<li>The malicious application or script executes the <code>pluginkit</code> command with the <code>-e</code>, <code>use</code>, and <code>-i</code> flags to register a new Finder Sync plugin.</li>
<li><code>pluginkit</code> registers the malicious plugin, adding it to the system&rsquo;s list of available Finder extensions.</li>
<li>The Finder process detects the newly registered plugin and loads it.</li>
<li>The malicious plugin executes its payload, which could involve running arbitrary code or modifying the Finder interface.</li>
<li>The plugin&rsquo;s code is designed to maintain persistence, potentially re-executing after system restarts or user logins.</li>
<li>The malicious plugin establishes a connection to a command-and-control server for further instructions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to persistent execution of malicious code on macOS systems. Attackers can maintain unauthorized access, steal sensitive information, or perform other malicious activities. The rule helps detect and prevent such persistence mechanisms, reducing the risk of long-term compromise. While the number of victims is unknown, targeted sectors could include any environment where macOS is prevalent, such as creative industries or software development.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Elastic Defend and ensure it&rsquo;s configured to monitor process execution events to activate the detections (setup guide in rule description).</li>
<li>Deploy the provided Sigma rules to detect suspicious <code>pluginkit</code> executions and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the parent processes and plugin identifiers involved.</li>
<li>Block known malicious parent processes (python, node, osascript, bash, sh, zsh) when spawning <code>pluginkit</code> with <code>-e -i use</code> arguments based on identified incidents.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>macos</category><category>pluginkit</category><category>finder sync plugin</category></item></channel></rss>