Connection to cryptomining pool
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
WARNING: This rule will be deprecated on 20 October 2025.
See the announcement for more information.
Goal
Detect when a resource connects to a known cryptocurrency mining pool.
Strategy
This detection enriches network flow data with threat intelligence and alerts when a destination domain is categorized as a mining pool.
Triage and response
- Use host metrics to verify if a spike in CPU usage occurred. If it did, determine the responsible process.
- Isolate the workload, preserving it for analysis.
- Determine the initial entry point using related signals and relevant logs.
- Find and repair the root cause of the incident.
This detection is based on data from Cloud Network Monitoring.