- Home
- Techniques
- Enterprise
- Resource Hijacking
Resource Hijacking
Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems which may impact system and/or hosted service availability.
One common purpose for Resource Hijacking is to validate transactions of cryptocurrency networks and earn virtual currency. Adversaries may consume enough system resources to negatively impact and/or cause affected machines to become unresponsive.[1] Servers and cloud-based[2] systems are common targets because of the high potential for available resources, but user endpoint systems may also be compromised and used for Resource Hijacking and cryptocurrency mining.
Procedure Examples
Name | Description |
---|---|
APT41 |
APT41 deployed a Monero cryptocurrency mining tool in a victim’s environment.[3] |
Blue Mockingbird |
Blue Mockingbird has used XMRIG to mine cryptocurrency on victim systems.[4] |
Bonadan |
Bonadan can download an additional module which has a cryptocurrency mining extension.[5] |
CookieMiner |
CookieMiner has loaded coinmining software onto systems to mine for Koto cryptocurrency. [6] |
Imminent Monitor |
Imminent Monitor has the capability to run a cryptocurrency miner on the victim machine.[7] |
Lazarus Group |
Lazarus Group has subset groups like Bluenoroff who have used cryptocurrency mining software on victim machines.[1] |
LoudMiner |
LoudMiner harvested system resources to mine cryptocurrency, using XMRig to mine Monero.[8] |
Rocke | |
Skidmap |
Skidmap is a kernel-mode rootkit used for cryptocurrency mining.[11] |
Mitigations
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
Detection
Consider monitoring process resource usage to determine anomalous activity associated with malicious hijacking of computer resources such as CPU, memory, and graphics processing resources. Monitor for suspicious use of network resources associated with cryptocurrency mining software. Monitor for common cryptomining software process names and files on local systems that may indicate compromise and resource usage.
References
- GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019.
- CloudSploit. (2019, June 8). The Danger of Unused AWS Regions. Retrieved October 8, 2019.
- Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
- Lambert, T. (2020, May 7). Introducing Blue Mockingbird. Retrieved May 26, 2020.
- Dumont, R., M.Léveillé, M., Porcher, H. (2018, December 1). THE DARK SIDE OF THE FORSSHE A landscape of OpenSSH backdoors. Retrieved July 16, 2020.
- Chen, y., et al. (2019, January 31). Mac Malware Steals Cryptocurrency Exchanges’ Cookies. Retrieved July 22, 2020.
- Unit 42. (2019, December 2). Imminent Monitor – a RAT Down Under. Retrieved May 5, 2020.
- Malik, M. (2019, June 20). LoudMiner: Cross-platform mining in cracked VST software. Retrieved May 18, 2020.
- Liebenberg, D.. (2018, August 30). Rocke: The Champion of Monero Miners. Retrieved May 26, 2020.
- Xingyu, J.. (2019, January 17). Malware Used by Rocke Group Evolves to Evade Detection by Cloud Security Products. Retrieved May 26, 2020.
- Remillano, A., Urbanec, J. (2019, September 19). Skidmap Linux Malware Uses Rootkit Capabilities to Hide Cryptocurrency-Mining Payload. Retrieved June 4, 2020.