Crypto Miners Are Hacking into Cloud Platforms: Google Warns
- These attackers are exploiting various techniques to take control of the targets.
Crypto miners are using compromised cloud accounts to scale their illicit operations, the internet giant, Google warned in a report recently published, entitled ‘Threat Horizons’ by its cybersecurity action team.
According to the findings, 86 percent of the 50 hacked Google Cloud Platforms (GCPs), which use a lot of computational resources and storage space, were targeted for cryptocurrency mining. Additionally, the team elaborated that a piece of crypto mining software was downloaded within 22 seconds of the account being compromised for the majority of the cases.
“This suggests that the initial attacks and subsequent downloads were scripted events not requiring human intervention. The ability to manually intervene in these situations to prevent exploitation is nearly impossible,” the report stated.
Hackers are exploiting poor customer security or vulnerability in third-party software to exploit these cloud platforms.
Moreover, Google’s cybersecurity Cybersecurity Cybersecurity is a blanket term that refers to the protection of computer systems and networks from the theft.More broadly speaking, cybersecurity can also represent countermeasures against damage to hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.It was not long ago that the term cybersecurity not exist as it was first used in 1989. In today’s vernacular cybersecurity, refers to measures taken to protect a computer or computer Cybersecurity is a blanket term that refers to the protection of computer systems and networks from the theft.More broadly speaking, cybersecurity can also represent countermeasures against damage to hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.It was not long ago that the term cybersecurity not exist as it was first used in 1989. In today’s vernacular cybersecurity, refers to measures taken to protect a computer or computer Read this Term action recommended the users of its cloud services to use two-factor authentication and use the services from the company's work safer security program.
Phishing Attacks
In addition to the threats of crypto mining, the internet giant warned against phishing Phishing Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno Read this Term attacks, mostly by Russian cybercriminals who usually send warnings to users that their accounts were targeted by government-backed attackers and North Korean cybercriminals who targeted people disguised as Samsung recruiters.
“We believe that government-backed attackers may be trying to trick you to get your account password,” one of the phishing emails stated.
Furthermore, the report stressed the threats of growing ransomware attacks, which use sophisticated and heavily encrypted software to extort money by locking the data.
“Google has received reports that the Black Matter ransomware group has announced it will shut down operations given outside pressure. Until this is confirmed, Black Matter still poses a risk,” the report stated.
Crypto miners are using compromised cloud accounts to scale their illicit operations, the internet giant, Google warned in a report recently published, entitled ‘Threat Horizons’ by its cybersecurity action team.
According to the findings, 86 percent of the 50 hacked Google Cloud Platforms (GCPs), which use a lot of computational resources and storage space, were targeted for cryptocurrency mining. Additionally, the team elaborated that a piece of crypto mining software was downloaded within 22 seconds of the account being compromised for the majority of the cases.
“This suggests that the initial attacks and subsequent downloads were scripted events not requiring human intervention. The ability to manually intervene in these situations to prevent exploitation is nearly impossible,” the report stated.
Hackers are exploiting poor customer security or vulnerability in third-party software to exploit these cloud platforms.
Moreover, Google’s cybersecurity Cybersecurity Cybersecurity is a blanket term that refers to the protection of computer systems and networks from the theft.More broadly speaking, cybersecurity can also represent countermeasures against damage to hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.It was not long ago that the term cybersecurity not exist as it was first used in 1989. In today’s vernacular cybersecurity, refers to measures taken to protect a computer or computer Cybersecurity is a blanket term that refers to the protection of computer systems and networks from the theft.More broadly speaking, cybersecurity can also represent countermeasures against damage to hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.It was not long ago that the term cybersecurity not exist as it was first used in 1989. In today’s vernacular cybersecurity, refers to measures taken to protect a computer or computer Read this Term action recommended the users of its cloud services to use two-factor authentication and use the services from the company's work safer security program.
Phishing Attacks
In addition to the threats of crypto mining, the internet giant warned against phishing Phishing Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno Phishing is a form of cyber-attack in which fake websites, emails, and text messages are used to elicit personal data. The most common targets in this assault are passwords, private cryptocurrency keys, and credit card details.Phishers disguise themselves as reputable businesses and other types of entities. In certain instances, reputable government organizations or authorities are impersonated in order to collect this data.Because phishing relies on psychological manipulation rather than techno Read this Term attacks, mostly by Russian cybercriminals who usually send warnings to users that their accounts were targeted by government-backed attackers and North Korean cybercriminals who targeted people disguised as Samsung recruiters.
“We believe that government-backed attackers may be trying to trick you to get your account password,” one of the phishing emails stated.
Furthermore, the report stressed the threats of growing ransomware attacks, which use sophisticated and heavily encrypted software to extort money by locking the data.
“Google has received reports that the Black Matter ransomware group has announced it will shut down operations given outside pressure. Until this is confirmed, Black Matter still poses a risk,” the report stated.