An attacker deploys cryptocurrency mining malware on 5 production servers after exploiting an unpatched vulnerability in a web management interface. The miners consume 90%+ CPU across all affected servers, causing severe performance degradation for production workloads. The mining pool connections are obfuscated through DNS-over-HTTPS to avoid detection.
| Metric | Expected | Actual | Result |
|---|---|---|---|
| Pattern Recognition | HIGH_CPU | HIGH_CPU | |
| Severity Assessment | CRITICAL | CRITICAL | |
| Incident Correlation | Yes | 57 linked | |
| Cascade Escalation | Yes | Yes | |
| Remediation | — | Auto-Heal — Corax resolves autonomously |
5 Linux production servers compromised. XMRig miner deployed as 'kworker' process. CPU usage: 90-98% on all 5 servers. Mining pool: MoneroOcean via DNS-over-HTTPS proxy. Initial access: unpatched Apache Tomcat manager interface. Persistence: systemd service 'system-update.service'.