Resource Hijacking

MITRE ATT&CK Content


Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability.

Resource hijacking may take a number of different forms. For example, adversaries may:

* Leverage compute resources in order to mine cryptocurrency * Sell network bandwidth to proxy networks * Generate SMS traffic for profit * Abuse cloud-based messaging services to send large quantities of spam messages

In some cases, adversaries may leverage multiple types of Resource Hijacking at once.

References

Technique Information

ID: T1496
Aliases: T1496
Tactics:
  • Impact
Platforms:
  • Windows
  • IaaS
  • Linux
  • macOS
  • Containers
  • Amazon Web Services (AWS)
Created: 17 Apr 2019
Last Modified: 03 Jun 2025