Connection to cryptomining pool


Detect when a resource connects to a known cryptocurrency mining pool.


This detection enriches network flow data with threat intelligence and alerts when a destination domain is categorized as a mining pool.

Triage and response

  1. Use host metrics to verify if a spike in CPU usage occurred. If it did, determine the responsible process.
  2. Isolate the workload, preserving it for analysis.
  3. Determine the initial entry point using related signals and relevant logs.
  4. Find and repair the root cause of the incident.

This detection is based on data from Network Performance Monitoring.