IR-008cloudv1.0.0
Cloud Resource Hijacking (Cryptomining and Unauthorized Compute)
⚠️ high⚠️ critical
⏱ Est. Time35m
📋 Steps9 steps
🔧 Tools5 required
🔗 Integrations5 platforms
📊 Avg Resolution60m
🔧 Tools Required
aws cloudtrailaws guarddutyaws cost exploreraws iamsiem
⚡ Triggers
cloud_cost_anomaly_alertaws_guardduty_cryptomining_findingcompute_usage_spikebilling_threshold_breachsiem_unusual_instance_creation
🔌 Integrations
req
aws guardduty
CryptoCurrency:EC2/BitcoinTool.B, UnauthorizedAccess:EC2/TorClient findings
req
aws cost explorer
Cost anomaly detection and usage breakdown by service/region
req
aws cloudtrail
Full API audit trail for instance creation and credential usage
opt
datadog
Cloud cost monitoring and compute anomaly detection
opt
lacework
Cloud security posture and anomaly detection alternative
Click each step to expand the full procedure, automation hints, and expected outputs.