T1496.002

Bandwidth Hijacking

Adversaries may leverage the network bandwidth resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. This includes proxyjacking (selling victim bandwidth and IP address to proxyware services such as Honeygain, IPRoyal Pawns, Peer2Profit, PacketStream, and Traffmonetizer), participating in botnets for network denial of service campaigns, seeding malicious torrents, and conducting internet-wide scanning using victim systems. Proxyware agents installed on victim machines route third-party traffic through the victim's IP address, generating revenue for the adversary while consuming the victim's bandwidth and potentially implicating the victim's IP in illegal activity.

Microsoft Sentinel / Defender
kusto
let KnownProxywareProcesses = dynamic([
  "honeygain.exe", "honeygainclient.exe",
  "iproyal-desktop.exe", "iproyal_desktop.exe", "pawns.exe",
  "peer2profit.exe", "p2p-node.exe",
  "packetstream.exe", "psnode.exe",
  "traffmonetizer.exe", "traffmain.exe",
  "earnapp.exe",
  "repocket.exe",
  "bitping.exe",
  "mysterium.exe", "myst.exe"
]);
let ProxywareDomainKeywords = dynamic([
  "honeygain", "iproyal", "pawns.app",
  "peer2profit", "packetstream", "traffmonetizer",
  "earnapp", "repocket", "bitping", "mysterium.network"
]);
// Branch 1: Known proxyware agent binary execution
let Branch1 = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ (KnownProxywareProcesses)
| extend DetectionBranch = "KnownProxywareBinary"
| project Timestamp, DeviceName, AccountName, FileName, FolderPath,
         ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine,
         SHA256, DetectionBranch;
// Branch 2: Network connections to known proxyware service domains
let Branch2 = DeviceNetworkEvents
| where Timestamp > ago(24h)
| where RemoteUrl has_any (ProxywareDomainKeywords)
    or RemoteDnsQuestion has_any (ProxywareDomainKeywords)
| extend DetectionBranch = "ProxywareDomainConnection"
| project Timestamp, DeviceName,
         InitiatingProcessFileName, InitiatingProcessCommandLine,
         RemoteUrl, RemoteDnsQuestion, RemoteIP, RemotePort,
         DetectionBranch;
union Branch1, Branch2
| sort by Timestamp desc
medium severity high confidence

Data Sources

Process: Process Creation Network Traffic: Network Connection Creation Network Traffic: Network Traffic Flow Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents DeviceNetworkEvents

False Positives

  • Legitimate voluntary installation of proxyware by the endpoint user who consented to share bandwidth for reward (common in BYOD environments)
  • Security researchers testing proxyware tools in an isolated lab environment
  • CDN edge nodes, proxy appliances, or load balancers with high legitimate external connection volumes that match domain keywords
  • Peer-to-peer collaboration or conferencing applications (WebRTC-based) whose domain names partially match proxyware keyword patterns
  • Authorized penetration testing tools or network scanning appliances generating high external connection counts

Unlock Pro Content

Get the full detection package for T1496.002 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections