T1496 - Resource Hijacking
Tattiche:
Impact
Impact
Piattaforme:
Windows IaaS Linux macOS +2
Windows IaaS Linux macOS +2
Rilevamento:
Not specified
Not specified
Description:
Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability.
Resource hijacking may take a number of different forms. For example, adversaries may:
* Leverage compute resources in order to mine cryptocurrency
* Sell network bandwidth to proxy networks
* Generate SMS traffic for profit
* Abuse cloud-based messaging services to send large quantities of spam messages
In some cases, adversaries may leverage multiple types of Resource Hijacking at once.(Citation: Sysdig Cryptojacking Proxyjacking 2023)
Resource hijacking may take a number of different forms. For example, adversaries may:
* Leverage compute resources in order to mine cryptocurrency
* Sell network bandwidth to proxy networks
* Generate SMS traffic for profit
* Abuse cloud-based messaging services to send large quantities of spam messages
In some cases, adversaries may leverage multiple types of Resource Hijacking at once.(Citation: Sysdig Cryptojacking Proxyjacking 2023)
Metadata
| MITRE ID: | T1496 |
| STIX ID: | attack-pattern--cd25c1b4-935c-... |
| Piattaforme: | Windows, IaaS, Linux, macOS, Containers, SaaS |
| Created: | 13/01/2026 17:48 |
| Updated: | 14/03/2026 04:00 |