Flash News

POLITIKOFF

Hackers are using servers in Google Cloud

Hackers are using servers in Google Cloud
Illustrative Photo

In a report aimed at assessing threats to Cloud users, Google's Cyber ​​Security Action Team said some attackers were using "badly configured" accounts to undermine the cryptocurrency.

On Wednesday, the Google team said that of the 50 incidents analyzed that compromised the Google Cloud Protocol, 86% were related to crypto mining. Hackers used compromised Cloud accounts to access resources from individuals ’CPUs or GPUs to undermine arguments or take advantage of storage space when mining coins on the Chia Network.

However, the Google team reported that many of the attacks were not limited to a single malicious action such as crypto mining, but were also points to carry out other hacks and identify other vulnerable systems. According to the cyber security team, actors typically gained access to Cloud accounts as a result of "poor client security practices" or "unprotected third-party software".

"While data theft did not appear to be the target of these compromises, it remains a risk associated with Cloud asset compromises as bad actors begin to commit multiple forms of abuse," said the Cyber ​​Security Action Team. "Cloud public instances facing the Internet were open to scanning and brute force attacks."

The speed of the attacks is also worth mentioning. According to Google Analytics, hackers were able to download cryptocurrency mining software into compromised accounts within 22 seconds in most of the incidents analyzed. Google suggested that "initial attacks and subsequent downloads were written events that did not require human intervention" and said it would be almost impossible to intervene manually to stop such incidents once they started.

Burimi: Cointelegraph

Latest news