EXPLORE
← Back to Explore
T1496.001

Compute Hijacking

Adversaries may leverage the compute resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. One common purpose for [Compute Hijacking](https://attack.mitre.org/techniques/T1496/001) is to validate transactions of cryptocurrency networks and earn virtual currency. Adversaries may consume enough system resources to negatively impact and/or cause affected machines to become unresponsive.(Citation: Kaspersky Lazarus Under The...

WindowsIaaSLinuxmacOSContainers
2
Detections
1
Sources
4
Threat Actors

BY SOURCE

2elastic

PROCEDURES (1)

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

DETECTIONS (2)