⚠
BowTie Risk
Assessments
Hazards
Library
Implementations
Guide
← Back
Edit Consequence
Name
Category
Tags
(comma-separated)
Description
Adversaries may leverage the network bandwidth resources of co-opted systems to complete resource-intensive tasks, which may impact system and/or hosted service availability. Adversaries may also use malware that leverages a system's network bandwidth as part of a botnet in order to facilitate Network Denial of Service campaigns and/or to seed malicious torrents. Alternatively, they may engage in proxyjacking by selling use of the victims' network bandwidth and IP address to proxyware services.
Save changes
Cancel