
Summary
The Zscaler CryptoMiner Downloaded Threat Blocked detection rule identifies attempts to download cryptomining software that are blocked by the Zscaler security platform. Leveraging web proxy logs, it analyzes critical data elements such as the owner of the device, user identity, URL category, destination URL, and source/destination IP addresses. The analytic focuses on detecting any blocked download actions affiliated with cryptominer threats, allowing for timely identification and remediation by Security Operations Centers (SOCs). Such downloads, if executed, could lead to unauthorized utilization of network resources for cryptomining, severely impacting system performance and heightening operational expenses. The rule uses a specific search query to aggregate data on these blocked actions, thus facilitating security monitoring of cryptomining activity.
Categories
- Web
- Cloud
Data Sources
- Web Credential
- Network Traffic
ATT&CK Techniques
- T1566
Created: 2024-11-15