OSX.WindShift (2018) file esitration implant, with a unique infection vector
5
The Mac Malware of 2018 a comprehensive report on infection, persistence, and capabilities
6
CVE-2017-7149: Password Exposure
7
CVE-2017-13872: #iamroot
8
The Mac App Store
9
Process Monitoring
10
File Monitoring
11
Synthetic Click Monitoring
12
Cam/Mic Monitoring
13
Game (Logic) Engine pieces of the puzzle
14
Game (Logic) Engine: (re)Applied
15
Apple's "GameplayKit"
16
GKRuleSystem Class
17
Developing "Game Plans" detecting methods of persistence
18
Chaining Logic Blocks ...for more accurate and actionable detectio
19
Detect (All?) Things hall the power of the predicatel
20
Threat Hunting
21
GamePlan
22
Finale
23
Question & Answers
Description:
Explore a comprehensive approach to detecting Mac malware using behavior-based monitoring and Apple's game engine in this RSA Conference talk. Dive into current macOS threats, monitoring capabilities, and the innovative use of Apple's GameplayKit for cybersecurity. Learn about an open-source monitoring framework that passively collects system events and a rule-based system leveraging Apple's game engine for efficient threat detection. Discover how to develop "Game Plans" for detecting persistence methods, chain logic blocks for more accurate detection, and conduct threat hunting using predicates. Gain insights into process, file, synthetic click, and camera/microphone monitoring techniques. Understand the potential of this extensible detection, response, and threat hunting platform for comprehensive Mac security.