Create a GCE GPU Virtual Machine
idempotent
Platform: GCP
Mappings
- MITRE ATT&CK
- Impact
Description
Creates a GCE virtual machine instance with GPU accelerators, simulating an attacker creating GPU instances for cryptomining.
Warm-up:
- None
Detonation:
- Attempt to create a GCE instance with a GPU accelerator (nvidia-tesla-t4) attached
Note: The instance creation may fail in GCP projects without GPU quota. However, the GCP audit log is still generated with the GPU accelerator request parameters, which is sufficient for detection rules to match on.
⚠️ Warning: If the instance is successfully created, it will incur GPU costs. Make sure to revert the technique after detonation to clean up created resources and avoid unnecessary costs.
References:
- https://www.mandiant.com/resources/blog/detecting-cryptomining-cloud
- https://cloud.google.com/blog/topics/threat-intelligence/detecting-cryptomining-using-vpc-flow-logs
Instructions
Detection
Identify when GCE instances with GPU accelerators are created by monitoring for v1.compute.instances.insert or
beta.compute.instances.insert events in GCP Admin Activity audit logs where the request includes guestAccelerators.
Attackers frequently provision GPU-enabled VMs for cryptocurrency mining after compromising cloud credentials. GPU VMs are significantly more expensive than standard VMs and are rarely used in most environments.
Detection criteria:
- Monitor
compute.instances.insertevents where the request containsguestAccelerators.acceleratorCount - Alert on any instance creation with GPU accelerators, especially from unusual principals or outside of normal change windows
- Consider higher severity when the caller IP is associated with known anonymizing proxies or botnets