🛡️ Challenge 03 • Cryptocurrency Miner Detection

Offline Level 3 Resource Hijacking
💡 Next Hint: 30s

Mission Brief

Your monitoring system flagged abnormally high CPU usage (98%) on production server (app-server-02) at 15:22 UTC on November 28, 2025. The server is running Ubuntu 22.04 and normally operates at 15-20% CPU. Your mission is to analyze system logs to identify the source of resource consumption and determine if the system has been compromised.

⚠️ SYNTHETIC SCENARIO
All log data, process names, cron jobs, and network addresses in this challenge are synthetically generated for training purposes. No real malware samples or C2 servers are represented.

Available Artifacts

  • /var/log/syslog – System events, cron jobs, and process spawning
  • /var/log/cron.log – Scheduled task execution history
  • ps aux output – Running process snapshot
  • Interactive Terminal – Run grep/awk commands to analyze logs

Learning Objectives

  • Detect cryptocurrency miners through resource anomalies
  • Identify persistence mechanisms (cron jobs, systemd services)
  • Analyze process trees and suspicious binary names
  • Correlate system logs with network connections
  • Understand resource hijacking attack techniques