Crypto Mining
Unauthorized deployment of cryptocurrency mining software on compromised infrastructure — often a foothold indicator for broader compromise, not just a resource theft issue.
Triage
2 proceduresContainment
2 proceduresP1
Contain the Mining Workload and Entry Vector
~60 min
P1
Isolate Compromised Kubernetes Workload
~120 min
Sponsored