Resources • Webinars
The Detection Series: Open Scripting Architecture, AppleScript, and JavaScript for Automation
AppleScript, JXA, and other abuses of OSA are prevalent in macOS malware. We’ve gathered the experts to show you where to look for activity, how to develop detection analytics, and ways to test your visibility.
ON-DEMAND
1 Hour
Virtual
AppleScript, JXA, and other abuses of OSA are prevalent in macOS malware. We’ve gathered the experts to show you where to look for activity, how to develop detection analytics, and ways to test your visibility.
In this 60-minute webinar, experts from Jamf, MITRE ATT&CK®, and Red Canary will uncover:
- The intricacies of Mac scripting is and why it’s so critical on macOS systems
- How adversaries abuse AppleScript, JXA, and other scripting languages
- How defenders can observe, detect, and emulate suspicious and malicious scripting behavior on macOS
MEET THE SPEAKERS
Brandon Dalton
Senior Threat Researcher | Red Canary
Cat Self
macOS/Linux Lead | MITRE ATT&CK
Ferdous Saljooki
macOS Detections Developer II | Jamf
Tony Lambert
Senior Malware Analyst | Red Canary
Tell me more about AppleScript, JXA, and OSA
AppleScript is a versatile scripting language that Apple created to help developers automate tasks, manipulate applications, and control parts of the macOS operating system. While AppleScript is the default scripting language, the Open Scripting Architecture (OSA) allows developers to leverage other scripting languages on macOS—mostly JavaScript for Automation (JXA) in practice.
Collectively, AppleScript and languages introduced via OSA boast extensive sets of powerful features that administrators and developers can use to perform local or remote automation but that adversaries also abuse to inconspicuously accomplish a variety of objectives. Some common dual purposes scripting uses on macOS include:
- Executing shell commands
- Modifying system files
- Running Python scripts
- Gathering data from macOS application
- Displaying and manipulating graphical elements
- Executing Objective-C code
You’ll leave the webinar with a better understanding of what AppleScript and OSA is and how adversaries leverage them to perform malicious activity.