Tags
Cloud
ATT&CK Tactic
Impact (TA0040)
References
https://services.google.com/fh/files/misc/gcat_threathorizons_full_nov2021.pdfhttps://www.wiz.io/blog/chia-and-the-dangers-of-proof-of-storage-cryptojacking-in-the-cloud
Last edited
Feb 22, 2024 2:55 PM
Status
Finalized
Financially motivated threat actors can abuse cloud storage in order to mine certain crypto-currencies based on proof-of-storage coins, such as Chia. Abusing compromised resources in order to mine cryptocurrencies is known as cryptojacking.