DNS lookup for cryptocurrency mining pool

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Attackers often use compromised cloud infrastructure to mine cryptocurrency.

Strategy

Detect when a process performs a DNS lookup for a domain related to cryptomining.

Triage and response

{{@process.executable.name}} performed a DNS lookup for {{@dns.question.name}}

Note: Cryptocurrency mining is often a symptom of a greater issue. It is imperative to determine the initial entry point such as through compromised cloud credentials or an application that is vulnerable to remote code execution (RCE).

  1. Isolate the host or container and roll back to a known secure configuration.
  2. Use host metrics to verify that cryptocurrency mining is taking place. This will be indicated by an increase in CPU usage.
  3. Review the process tree, related signals, and related logs to determine the initial entry point.

Requires Agent version 7.36 or later

PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc