DET0267 Resource Hijacking Detection Strategy
| Item |
Value |
| ID |
DET0267 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1496 (Resource Hijacking)
Analytics
Windows
AN0741
Persistent high CPU utilization combined with suspicious command-line execution (e.g., mining tools or obfuscated scripts) and outbound connections to mining/proxy networks.
Log Sources
Mutable Elements
| Field |
Description |
| TimeWindow |
Duration threshold for sustained CPU activity (e.g., >15 minutes) |
| DestinationIPList |
Known mining pool IPs or proxy service endpoints |
| ExecutableNamePatterns |
Regex list of suspicious or known mining tools |
Linux
AN0742
Abnormal CPU/memory usage by unauthorized processes with outbound connections to known mining pools or using cron jobs/scripts to maintain persistence.
Log Sources
Mutable Elements
| Field |
Description |
| ProcessPath |
Location of resource-heavy binaries (e.g., /tmp/.xmr) |
| CPUThreshold |
Acceptable baseline for CPU overuse |
| KnownMiningDomains |
List of domains/IPs for known cryptomining services |
macOS
AN0743
Background launch agents/daemons with high CPU use and network access to external mining services.
Log Sources
Mutable Elements
| Field |
Description |
| launchdLabel |
Suspicious or unknown launch agents |
| TrafficVolumeThreshold |
Outbound bandwidth usage thresholds |
IaaS
AN0744
Sudden spikes in cloud VM CPU usage with outbound traffic to mining pools and unauthorized instance creation.
Log Sources
Mutable Elements
| Field |
Description |
| CPUUtilizationThreshold |
CloudWatch alarm trigger for sustained CPU |
| UnusualRegionList |
Instances launched in unexpected regions |
Containers
AN0745
High CPU usage by unauthorized containers running mining binaries or public proxy tools.
Log Sources
Mutable Elements
| Field |
Description |
| ImageName |
Suspicious or unknown container image used |
| CPUQuotaThreshold |
Container-level resource limits |
SaaS
AN0746
Abuse of cloud messaging platforms to send mass spam or consume quota-based resources.
Log Sources
Mutable Elements
| Field |
Description |
| MessageRateThreshold |
Max allowable outbound message rate per user/account |
| APIKeyList |
Known authorized API clients for messaging usage |