Compute Hijacking (T1496.001)

View on ATT&CK

In Playbook

Associated Tactics

  • Impact

Impact (TA0040)

The adversary is trying to manipulate, interrupt, or destroy your systems and data. Impact consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact can include destroying or tampering with data. In some cases, business processes can look fine, but may have been altered to benefit the adversaries’ goals. These techniques might be used by adversaries to follow through on their end goal or to provide cover for a confidentiality breach.

View on ATT&CK

Procedure Examples

Description Source(s)
Chen, J. et al. (2021, February 3). Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. Retrieved April 5, 2021. Unit 42 Hildegard Malware
CloudSploit. (2019, June 8). The Danger of Unused AWS Regions. Retrieved October 8, 2019. CloudSploit - Unused AWS Regions
GReAT. (2017, April 3). Lazarus Under the Hood. Retrieved April 17, 2019. Kaspersky Lazarus Under The Hood Blog 2017
Oliveira, A. (2019, May 30). Infected Containers Target Docker via Exposed APIs. Retrieved April 6, 2021. Trend Micro Exposed Docker APIs
Oliveira, A., Fiser, D. (2020, September 10). War of Linux Cryptocurrency Miners: A Battle for Resources. Retrieved April 6, 2021. Trend Micro War of Crypto Miners