Critical Infrastructure Cybersecurity Framework
T1496Impact

Resource Hijacking

Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems.

Description

Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems.

Quick Info

Technique ID
T1496
Tactic
Impact
Sub-Techniques
3
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.