YoVDO

Resource Hijacking

Offered By: Cybrary

Tags

Mitre Att&ck Framework Courses Cryptocurrency Mining Courses

Course Description

Overview

Once adversaries have a foothold on your system, they may take advantage of your resources to serve their own resource-intensive needs. One common reason they do this is to support cryptocurrency transaction validation and cryptomining. They may leverage your cloud-based systems, endpoint systems, and containerized environments for these purposes. As a result, you will see a drain on your resources that could negatively impact your business and the services you provide. Attackers may even use cryptomining malware to kill of your legitimate processes that take resources away from their activities.

You'll want to be sure you know how to detect and mitigate this activity to protect your company's system resources.

Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the financially motivated threat group Prophet Spider. Prevent adversaries from accomplishing the tactic of Impact in your environment today.


Syllabus

  • Resource Hijacking
    • What is Resource Hijacking?
    • Detection, Validation, and Mitigation (Lab)

Taught by

Owen Dubiel and Matthew Mullins

Related Courses

Application of the MITRE ATT&CK Framework
Cybrary
Active Scanning and Exploit Public-Facing Application
Cybrary
MITRE ATT&CK Defender™ ATT&CK® Adversary Emulation
Cybrary
Application Shimming and Data from Local System
Cybrary
MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification Training
Cybrary