Impact, detections, and mitigation
See: https://attack.mitre.org/techniques/T1496/
Resource hijacking
Containment
Eradication
Recovery
Lessons Learned / Post-mortem
* https://www.auscert.org.au/blog/2018-01-05-attackers-using-remote-coding-execution-vulnerabilities-install-cryptocurrency-miners-vulnerable-hosts