T1053.003 - Cron

Sub-technique
Tactics:
Execution Persistence Privilege Escalation
Platforms:
Linux macOS ESXi
Detection:
Not specified
Description:
Adversaries may abuse the <code>cron</code> utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The <code>cron</code> utility is a time-based job scheduler for Unix-like operating systems. The <code> crontab</code> file contains the schedule of cron entries to be run and the specified times for execution. Any <code>crontab</code> files are stored in operating system-specific file paths.

An adversary may use <code>cron</code> in Linux or Unix environments to execute programs at system startup or on a scheduled basis for [Persistence](https://attack.mitre.org/tactics/TA0003). In ESXi environments, cron jobs must be created directly via the crontab file (e.g., `/var/spool/cron/crontabs/root`).(Citation: CloudSEK ESXiArgs 2023)
Metadata
MITRE ID: T1053.003
STIX ID: attack-pattern--2acf44aa-542f-...
Platforms: Linux, macOS, ESXi
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00