Living off the land has been commonplace on Windows systems for years, so it’s no surprise that adversaries frequently leverage native tooling when they seek to compromise macOS systems. For the long-awaited return of our Detection Series webinars, Red Canary’s Tony Lambert and Brandon Dalton joined Cat Self from MITRE and Ferdous (“Sal”) Saljooki from Jamf to explain why adversaries exploit Apple’s native scripting capabilities, and how to ward them off.
So, what are these native capabilities?
Scripting languages on macOS are beholden to a structure known as Apple’s Open Scripting Architecture (OSA). According to Apple:
“The Open Scripting Architecture (OSA) provides a standard and extensible mechanism for interapplication communication in OSX.”
Here, Cat offers a clarifying explanation of OSA and its components:
SentinelOne offers an insightful deep-dive on OSA for further learning.
Cat continues on to explains the benefits of leveraging OSA:
Who’s taking advantage?
Tony delves into who abuses OSA, AppleScript, and JXA, how they abuse it, and why.
What should I be looking for?
XCCSET, a malware threat that targets developers, is distributed as poisoned XCode project files.
Distributed as read-only, compiled AppleScript, OSAMiner is a multi-stage threat that retrieves a Monero miner and installs it on a macOS system.
Often used by Red Team operators, the Apfell Agent is a JXA agent created to talk to Mythic C2.
Brandon illustrates the purpose and facilitation of Apple’s Endpoint Security Framework (ESF) for monitoring system events.
Sal walks us through ways to advance detection coverage by leveraging available telemetry.
Can I emulate these behaviors to test detection coverage?
Absolutely! Thus far, the panelists have discussed how and why adversaries abuse AppleScript and JXA, where defenders can find telemetry to observe suspicious activity, and how you can leverage that telemetry to develop or improve detection coverage.
Using our newly released POSIX AtomicTestHarness suite you can quickly test for detection coverage gaps. AtomicTestHarnesses focus on the art of the possible. If an adversary were to leverage AppleScript / JXA to attack macOS, what different ways could they go about doing that? AtomicTestHarnesses help answer this question.
Brandon discusses how to test your visibility into suspect AppleScript and JXA activity in your environment.
Speaking of the POSIX AtomicTestHarness suite, Red Canary’s Brandon Dalton and Dave Bogle wrote a blog delving into how the POSIX Atomic Test Harnesses suite leverages Python to emulate multiple variations of a given ATT&CK technique on Linux and macOS systems. Read it here!
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.