Resource Hijacking
Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. Resource hijacking may take a number of different forms. For example, adversaries may: * Leverage compute resources in order to mine cryptocurrency * Sell network bandwidth to proxy networks * Generate SMS traffic for profit * Abuse cloud-based messaging services to send large quantities of spam messages In some cases, adversaries may le...
BY SOURCE
PROCEDURES (16)
Auto-extracted: 3 detections for network connection monitoring
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 2 detections for cloud monitoring
Auto-extracted: 1 detections for registry monitoring
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for kubernetes
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for email
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for email