Crypto miner process observed

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください

What happened

The process {{ @process.comm }} was identified as a crypto miner. Cryptocurrency mining monopolizes CPU usage, slowing legitimate services.

Goal

Detect when a process launches with arguments associated with cryptocurrency miners.

Strategy

Monitor systems process and analyze command-line arguments to identify specific patterns or arguments commonly associated with cryptocurrency mining software. Miners are often executed with unique arguments such as --donate-level.

Triage and response

Note: Cryptocurrency mining is often a symptom of a greater issue. It is imperative to determine the initial entry point such as through compromised cloud credentials or an application that is vulnerable to remote code execution (RCE).

  1. Use host metrics to verify that cryptocurrency mining is taking place. This is indicated by an increase in CPU usage.
  2. Review the process tree, related signals, and related logs to determine the initial entry point.
  3. Remediate the affected resources and secure the initial entry point. This may involve patching vulnerabilities or rotating credentials.

Changelog

  • 26 September 2024 - Updated rule name and description

Requires Agent version 7.28 or later