Resource Hijacking: Compute Hijacking
Other sub-techniques of Resource Hijacking (7)
Unreleased. TBD
Detection
ID | Data Source | Data Component | Description |
---|---|---|---|
DS0029 | Network Traffic | Network Connection Creation | Monitor for newly constructed network connections that are sent or received by untrusted hosts. Look for connections to/from strange ports, as well as reputation of IPs and URLs related to cryptocurrency hosts. In AWS environments, configure GuardDuty to alert when EC2 instances query IP addresses associated with known cryptocurrency activity. |