🍎 macOS
Suspicious Clipboard Data Exfiltration Via OSAScript
Detects suspicious clipboard data collection combined with network activity or file operations via osascript. This pattern indicates potential data exfiltration where clipboard contents are being sent externally or saved to disk.
Author: Chris S (@avrgsec_)
Date: 2025-11-01
Level: HIGH
Status: experimental
Sigma Rule
title: Suspicious Clipboard Data Exfiltration Via OSAScript
id: a7f9d3e1-4c8b-4a2f-9e5d-1b3c7f8a9d2e
status: experimental
description: |
Detects suspicious clipboard data collection combined with network activity or file operations via osascript.
This pattern indicates potential data exfiltration where clipboard contents are being sent externally or saved to disk.
references:
- https://www.sentinelone.com/blog/how-offensive-actors-use-applescript-for-attacking-macos/
author: Chris S (@avrgsec_)
date: "2025-11-01"
tags:
- attack.collection
- attack.t1115
- attack.exfiltration
- attack.t1041
- attack.execution
- attack.t1059.002
logsource:
product: macos
category: process_creation
detection:
selection_img:
Image|endswith: "/osascript"
selection_clipboard:
CommandLine|contains:
- "the clipboard"
- "clipboard info"
selection_exfil:
CommandLine|contains:
- "curl"
- "wget"
- "do shell script"
- "write to file"
- "open location"
- "URL"
- "http"
- "/tmp/"
- "/var/tmp/"
condition: all of selection_*
falsepositives:
- Rare legitimate clipboard sharing or synchronization tools
level: high
False Positives
- • Rare legitimate clipboard sharing or synchronization tools