Rule Category

PUA-OTHER -- Snort has detected a Potentially Unwanted Application (PUA). This Is a program which installs adware or toolbars, collects information, runs unwanted processes that consume computing resources, or has otherwise unclear objectives. These are usually additional programs bundled with legitimate programs. Some users consider the benefit of the main application to outweigh the risks of the PUA; you are paying for a free product by contributing with advertising or data. These alerts are often assigned a lower risk, as they are not directly malicious or as fast-spreading as worms or trojans. This alert concerns traffic typical of PUAs that are not common enough to warrant their own category. This is commonly associated with cryptocurrency mining activity.

Alert Message

PUA-OTHER Cryptocurrency Miner outbound connection attempt

Rule Explanation

This rule looks for an attempt to join a mining pool by verifying the options specified in the TCP stratum protocol data. You can verify this by looking for a login that contains the User ID, password, and agent associated with the miner.

What To Look For

This event is generated when a cryptocurrency miner attempts an outbound connection to join a mining pool.

Known Usage

Attacks/Scans seen in the wild

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

No rule groups

CVE

None

Additional Links

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None

MITRE ATT&CK Framework

Tactic: Impact

Technique: Resource Hijacking

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org