This document describes a threat finding type in Security Command Center. Threat findings are generated by threat detectors when they detect a potential threat in your cloud resources. For a full list of available threat findings, see Threat findings index.
Overview
VM Threat Detection detected multiple categories of findings within a single
day from a single source. A single application can simultaneously trigger
Execution: Cryptocurrency Mining YARA Rule
and
Execution: Cryptocurrency Mining Hash Match findings
.
How to respond
The following response plan might be appropriate for this finding, but might also impact operations. Carefully evaluate the information you gather in your investigation to determine the best way to resolve findings.
To respond to this finding, do the following:
- Follow the response instructions for
Execution: Cryptocurrency Mining YARA Rule
findings. - Follow the response instructions for
Execution: Cryptocurrency Mining Hash Match
findings.
What's next
- Learn how to work with threat findings in Security Command Center.
- Refer to the Threat findings index.
- Learn how to review a finding through the Google Cloud console.
- Learn about the services that generate threat findings.