T1496 Resource Hijacking
Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability.
Resource hijacking may take a number of different forms. For example, adversaries may:
- Leverage compute resources in order to mine cryptocurrency
- Sell network bandwidth to proxy networks
- Generate SMS traffic for profit
- Abuse cloud-based messaging services to send large quantities of spam messages
In some cases, adversaries may leverage multiple types of Resource Hijacking at once.1
| Item | Value |
|---|---|
| ID | T1496 |
| Sub-techniques | T1496.001, T1496.002, T1496.003, T1496.004 |
| Tactics | TA0040 |
| Platforms | Containers, IaaS, Linux, SaaS, Windows, macOS |
| Version | 2.0 |
| Created | 17 April 2019 |
| Last Modified | 24 October 2025 |