process where host.os.type == "macos" and event.type in ("start", "process_started") and
process.name in ("defaults", "mkpassdb") and process.args like~ ("ShadowHashData", "-dump")
Install detection rules in Elastic Security
Detect Dumping Account Hashes via Built-In Commands in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).