Why Organizations Should Take Cloud-Based Cryptocurrency-Mining Attacks Seriously
Tags
attack-pattern: | Data Indirect Cloud Api - T1059.009 Malware - T1587.001 Malware - T1588.001 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | 7402b5c4-7c21-42ec-9114-db427f03f2d1 |
Fingerprint | b6701889b7ad9705 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | March 29, 2022, midnight |
Added to db | Oct. 15, 2024, 6:49 p.m. |
Last updated | Oct. 15, 2024, 7:30 p.m. |
Headline | Why Organizations Should Take Cloud-Based Cryptocurrency-Mining Attacks Seriously |
Title | Why Organizations Should Take Cloud-Based Cryptocurrency-Mining Attacks Seriously |
Detected Hints/Tags/Attributes | 32/1/0 |
Source URLs
URL Provider