Resource Hijacking

Cybrary
Course
COMING SOON

Financially motivated attackers could take over your system resources for their own aims, such as to support cryptocurrency mining, thereby degrading your system or hosted service availability. This could have a serious impact on your organization's services. Learn how to flip the script and hijack the adversary in this lab-focused course.

Time
50 minutes
Difficulty
Intermediate
CEU/CPE
1
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Description

Once adversaries have a foothold on your system, they may take advantage of your resources to serve their own resource-intensive needs. One common reason they do this is to support cryptocurrency transaction validation and cryptomining. They may leverage your cloud-based systems, endpoint systems, and containerized environments for these purposes. As a result, you will see a drain on your resources that could negatively impact your business and the services you provide. Attackers may even use cryptomining malware to kill of your legitimate processes that take resources away from their activities.

You'll want to be sure you know how to detect and mitigate this activity to protect your company's system resources.

Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the financially motivated threat group Prophet Spider. Prevent adversaries from accomplishing the tactic of Impact in your environment today.

Instructed By
Owen Dubiel
Owen Dubiel
Security Practitioner
Instructor
Matthew Mullins
Matthew Mullins
Technical Manager, Red Team
Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Resource Hijacking Certificate of Completion