This document describes a threat finding type in Security Command Center. Threat findings are generated by threat detectors when they detect a potential threat in your cloud resources. For a full list of available threat findings, see Threat findings index.
Finding description
VM Threat Detection detected multiple categories of findings within a single
day from a single source. A single application can simultaneously trigger
Execution: Cryptocurrency Mining YARA Rule
and
Execution: Cryptocurrency Mining Hash Match findings
.
To respond to a combined finding, follow the response instructions for both
Execution: Cryptocurrency Mining YARA Rule
and
Execution: Cryptocurrency Mining Hash Match findings
.
What's next
- Learn how to work with threat findings in Security Command Center.
- Refer to the Threat findings index.
- Learn how to review a finding through the Google Cloud console.
- Learn about the services that generate threat findings.