Bandwidth Hijacking - T1496.002 (718cb208-6446-4572-a2f0-9c799c60091e)
Adversaries may leverage the network bandwidth resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability.
Adversaries may also use malware that leverages a system's network bandwidth as part of a botnet in order to facilitate Network Denial of Service campaigns and/or to seed malicious torrents.(Citation: GoBotKR) Alternatively, they may engage in proxyjacking by selling use of the victims' network bandwidth and IP address to proxyware services.(Citation: Sysdig Proxyjacking) Finally, they may engage in internet-wide scanning in order to identify additional targets for compromise.(Citation: Unit 42 Leaked Environment Variables 2024)
In addition to incurring potential financial costs or availability disruptions, this technique may cause reputational damage if a victim’s bandwidth is used for illegal activities.(Citation: Sysdig Proxyjacking)
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Resource Hijacking - T1496 (cd25c1b4-935c-4f0e-ba8d-552f28bc4783) | Attack Pattern | Bandwidth Hijacking - T1496.002 (718cb208-6446-4572-a2f0-9c799c60091e) | Attack Pattern | 1 |