Mining Incident Treated as Low Priority by Stakeholders

Stakeholders frame unauthorized mining as "just a resource cost" and push for immediate process-kill and closure rather than a full investigation. This under-scoping routinely leaves the entry vector open and misses secondary compromise (webshells, backdoors, credential theft) the attacker installed alongside the miner.

Signals

  • Stakeholder requests to "just kill it and move on" within hours of detection
  • Service owners resist persistence sweep or credential rotation
  • No documented plan for entry-vector remediation beyond the compromised host

Pivot Actions

  1. 1.Reframe the incident as a foothold compromise, not a resource-theft event: miners are commonly sold alongside access to broader compromise
  2. 2.Present the specific unknown risks (secondary tooling not yet ruled out, entry vector not yet closed) and the cost of learning the hard way weeks later
  3. 3.Insist on a minimum standard of care: persistence sweep, entry-vector closure, credential rotation on exposed accounts
  4. 4.Escalate to CISO or equivalent if local stakeholders continue to block full investigation

Alternate Evidence Sources

  • Past peer-organization incidents where under-investigated mining incidents led to major compromise (publicly documented case studies)
  • Threat-intel reports on miner families that carry secondary capabilities (Kinsing, Sysrv-hello, LemonDuck)