Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability.
Resource hijacking may take a number of different forms. For example, adversaries may:
In some cases, adversaries may leverage multiple types of Resource Hijacking at once.(Citation: Sysdig Cryptojacking Proxyjacking 2023)
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
amazon_guardduty | Amazon GuardDuty | technique_scores | T1496 | Resource Hijacking |
aws_cloudwatch | AWS CloudWatch | technique_scores | T1496 | Resource Hijacking |
aws_config | AWS Config | technique_scores | T1496 | Resource Hijacking |
aws_iot_device_defender | AWS IoT Device Defender | technique_scores | T1496 | Resource Hijacking |