Impact: Cryptomining Commands

This document describes a threat finding type in Security Command Center. Threat findings are generated by threat detectors when they detect a potential threat in your cloud resources. For a full list of available threat findings, see Threat findings index.

Overview

Known cryptomining commands were passed to Cloud Run jobs as entry points that are run when the job is executed.

How to respond

The following response plan might be appropriate for this finding, but might also impact operations. Carefully evaluate the information you gather in your investigation to determine the best way to resolve findings.

To respond to this finding, do the following:

  1. Check the job, the command, and the container to determine if this was expected.
  2. Delete the compromised job and container.

What's next