Google Cloud instances hijacked for illicit cryptomining

DMCA / Correction Notice
- Advertisement -


google cloud shared that malicious actors recently compromised 50 Google Cloud Platform (GCP) instances, of which the majority (86%) were used cryptocurrency mining,

- Advertisement -

Interestingly, Google notes that an analysis of compromised cloud instances used for illegal mining showed that in 58% of situations cryptocurrency Mining software was downloaded to the system within 22 seconds of the settlement

“This suggests that the initial attacks and subsequent downloads were scripted events that did not require human intervention. The ability to manually intervene in these situations to prevent exploits is nearly impossible. The best defense is to deploy a vulnerable system.” or there will be no automatic feedback mechanism.” shares Google Cloud.

Techradar needs you!
advertisement

We’re looking at how our readers use a VPN with streaming sites like Netflix so we can improve our content and offer better advice. This survey will take you no more than 60 seconds, and we would be very happy if you share your experiences with us.

>> Click here to start survey in new window <

- Advertisement -

Noting that most of the compromised instances were used for cryptocurrency mining rather than data exclusion, Google analysts fathomed that the attackers scanned a range of Google Cloud IP addresses, rather than targeting specific customers.

gcp attack

are part of the first issue of the description danger horizon report good Created after merging Intel from the Google Threat Analysis Group (TAG), the Google Cloud Security and Trust Center, and several other Google internal teams.

The search engine giant claims that the report aims to provide actionable intelligence to help organizations ensure that their cloud environments remain secure from ever-evolving threats.

In addition to cryptoming, the report also revealed that 10% of the compromised cloud instances were used to perform scans of other publicly available resources on the Internet to identify vulnerable systems, and 8% of the instances. was used to attack other targets.

protect your computer from best antivirus software, and purify them with best malware removal software

- Advertisement -

Stay on top - Get the daily news in your inbox

Recent Articles

Related Stories