Bandwidth Hijacking
Adversaries may leverage the network bandwidth resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. This includes proxyjacking (selling victim bandwidth and IP address to proxyware services such as Honeygain, IPRoyal Pawns, Peer2Profit, PacketStream, and Traffmonetizer), participating in botnets for network denial of service campaigns, seeding malicious torrents, and conducting internet-wide scanning using victim systems. Proxyware agents installed on victim machines route third-party traffic through the victim's IP address, generating revenue for the adversary while consuming the victim's bandwidth and potentially implicating the victim's IP in illegal activity.
let KnownProxywareProcesses = dynamic([
"honeygain.exe", "honeygainclient.exe",
"iproyal-desktop.exe", "iproyal_desktop.exe", "pawns.exe",
"peer2profit.exe", "p2p-node.exe",
"packetstream.exe", "psnode.exe",
"traffmonetizer.exe", "traffmain.exe",
"earnapp.exe",
"repocket.exe",
"bitping.exe",
"mysterium.exe", "myst.exe"
]);
let ProxywareDomainKeywords = dynamic([
"honeygain", "iproyal", "pawns.app",
"peer2profit", "packetstream", "traffmonetizer",
"earnapp", "repocket", "bitping", "mysterium.network"
]);
// Branch 1: Known proxyware agent binary execution
let Branch1 = DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ (KnownProxywareProcesses)
| extend DetectionBranch = "KnownProxywareBinary"
| project Timestamp, DeviceName, AccountName, FileName, FolderPath,
ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine,
SHA256, DetectionBranch;
// Branch 2: Network connections to known proxyware service domains
let Branch2 = DeviceNetworkEvents
| where Timestamp > ago(24h)
| where RemoteUrl has_any (ProxywareDomainKeywords)
or RemoteDnsQuestion has_any (ProxywareDomainKeywords)
| extend DetectionBranch = "ProxywareDomainConnection"
| project Timestamp, DeviceName,
InitiatingProcessFileName, InitiatingProcessCommandLine,
RemoteUrl, RemoteDnsQuestion, RemoteIP, RemotePort,
DetectionBranch;
union Branch1, Branch2
| sort by Timestamp desc Data Sources
Required Tables
False Positives
- Legitimate voluntary installation of proxyware by the endpoint user who consented to share bandwidth for reward (common in BYOD environments)
- Security researchers testing proxyware tools in an isolated lab environment
- CDN edge nodes, proxy appliances, or load balancers with high legitimate external connection volumes that match domain keywords
- Peer-to-peer collaboration or conferencing applications (WebRTC-based) whose domain names partially match proxyware keyword patterns
- Authorized penetration testing tools or network scanning appliances generating high external connection counts
References (7)
- https://attack.mitre.org/techniques/T1496/002/
- https://sysdig.com/blog/proxyjacking-attackers-log4j-exploited/
- https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/
- https://www.welivesecurity.com/2019/07/08/south-korean-users-backdoor-torrents/
- https://learn.microsoft.com/en-us/defender-endpoint/advanced-hunting-devicenetworkevents-table
- https://learn.microsoft.com/en-us/defender-endpoint/advanced-hunting-deviceprocessevents-table
- https://learn.microsoft.com/en-us/defender-endpoint/advanced-hunting-deviceregistryevents-table
Unlock Pro Content
Get the full detection package for T1496.002 including response playbook, investigation guide, and atomic red team tests.