DET0288 Detect Gatekeeper Bypass via Quarantine Flag and Trust Control Manipulation
| Item |
Value |
| ID |
DET0288 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1553.001 (Gatekeeper Bypass)
Analytics
macOS
AN0800
Correlates suspicious removal or modification of the com.apple.quarantine extended attribute, manipulation of LSFileQuarantineEnabled values in Info.plist, and unexpected process execution of unsigned or non-notarized binaries. Also monitors abnormal trust validation failures in unified logs and unusual activity in QuarantineEvents database entries.
Log Sources
Mutable Elements
| Field |
Description |
| QuarantineBypassAllowList |
Legitimate enterprise update tools or deployment frameworks that may strip quarantine flags |
| CertificateAuthorityList |
Baseline trusted Apple Developer IDs and enterprise certs used for code signing |
| TimeWindow |
Time correlation window for xattr modification followed by suspicious process execution |