Skip to content

T1496 Resource Hijacking

Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability.

Resource hijacking may take a number of different forms. For example, adversaries may:

  • Leverage compute resources in order to mine cryptocurrency
  • Sell network bandwidth to proxy networks
  • Generate SMS traffic for profit
  • Abuse cloud-based messaging services to send large quantities of spam messages

In some cases, adversaries may leverage multiple types of Resource Hijacking at once.1

Item Value
ID T1496
Sub-techniques T1496.001, T1496.002, T1496.003, T1496.004
Tactics TA0040
Platforms Containers, IaaS, Linux, SaaS, Windows, macOS
Version 2.0
Created 17 April 2019
Last Modified 24 October 2025

References