XPC Services (T1559.003)

View on ATT&CK

In Playbook

Associated Tactics

  • Execution

Execution (TA0002)

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View on ATT&CK

Procedure Examples

Description Source(s)
Apple. (2016, September 9). Creating XPC Services. Retrieved April 19, 2022. creatingXPCservices
Apple. (n.d.). Retrieved October 12, 2021. Designing Daemons Apple Dev
Mickey Jin. (2021, June 3). CVE-2021-30724: CVMServer Vulnerability in macOS and iOS. Retrieved October 12, 2021. CVMServer Vuln
Wojciech Reguła. (2020, June 29). Learn XPC exploitation. Retrieved October 12, 2021. Learn XPC Exploitation