T1496 - Resource Hijacking

Tactics:
Impact
Platforms:
Windows IaaS Linux macOS +2
Detection:
Not specified
Description:
Adversaries may leverage the resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability.

Resource hijacking may take a number of different forms. For example, adversaries may:

* Leverage compute resources in order to mine cryptocurrency
* Sell network bandwidth to proxy networks
* Generate SMS traffic for profit
* Abuse cloud-based messaging services to send large quantities of spam messages

In some cases, adversaries may leverage multiple types of Resource Hijacking at once.(Citation: Sysdig Cryptojacking Proxyjacking 2023)
Sub-techniques (4)
ID ATT&CK Actions
T1496.001 Compute Hijacking
T1496.002 Bandwidth Hijacking
T1496.003 SMS Pumping
T1496.004 Cloud Service Hijacking
Metadata
MITRE ID: T1496
STIX ID: attack-pattern--cd25c1b4-935c-...
Platforms: Windows, IaaS, Linux, macOS, Containers, SaaS
Created: 13/01/2026 17:48
Updated: 14/03/2026 04:00