123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Beauty >> View Article

Google Warns 'malicious Actors' Performing Crypto Mining Using Compromised Cloud Accounts

Profile Picture
By Author: Greg C. Ryan
Total Articles: 20
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

On Wednesday software giant Google issued latest cloud threat Intelligence report titled “Threat Horizons” report raising awareness among users and intelligence regarding security weaknesses in its platform.

As per Google around 86% of 50 recently compromised accounts are being used for malicious activity purpose. It also refers about malicious actors using compromised Google Cloud accounts for mining cryptocurrencies Chia, which use storage space as a mining resource. In the most of studied cases within 22 seconds of the account being compromised, cryptocurrency mining software was being downloaded. Within eight hours of being deployed 40% of the unsecured instances were being compromised. As per Google this reflects that malicious actor were tracking these unsecured Google instances actively and were systematically attacking these unsecured instances with only aiming to use it for this purpose. Google Cloud accounts is a remote storage platform for users to keep data and files off-site and hence have access to processing power that can be easily redirected to perform malicious tasks. To identify vulnerable systems ...
... around 10% of the compromised accounts were also used to conduct scans of other publicly available resources on the internet while 8% of instances were used to attack other targets.

Google states “This suggests that the public IP address space is routinely scanned for vulnerable Cloud instances. It will not be a matter of if a vulnerable Cloud instance is detected, but rather when”. Seth Rosenblatt, security editor at Google Cloud, in a blog post and Bob Mechler, director of the office of the chief information security officer at Google Cloud said, "The cloud threat landscape in 2021 was more complex than just rogue cryptocurrency miners, of course,"

More About the Author

I am an external analyst and working as a content writer

Total Views: 166Word Count: 274See All articles From Author

Add Comment

Beauty Articles

1. A Timeless Classic: The Allure Of Round Diamond Engagement Rings
Author: Olive

2. Ayurvedic Beauty Tips: Sundarta Ka Rahasya Ayurveda Ke Saath
Author: Trayi Ayurveda

3. Aloe Vera Gel For Sun Protection: Natural Skincare Solution
Author: Brihans Natural Products

4. Benefits Of Private Label Whitening Pens For Dental Brands
Author: Nutrix

5. The Complete Guide To Mouthwash Manufacturing: What Brands Need To Know
Author: Nutrix

6. The Wig Outlet
Author: The Wig Outlet

7. Top Trends To Look For When Visiting Men’s Hairdressers In Plymouth
Author: PaulineHill

8. Seiko Kello – Laadukkaat Ja Tyylikkäät Valinnat Miesten Rannekelloihin | Salkari.fi
Author: salkari.fi

9. Freeze Every Thrilling Moment With Singapore's Top Sports Photography
Author: Rainstar Photography

10. Metal Matters: How To Choose The Right Material For Your Timeless Piece
Author: Zuber Shaikh

11. Eyelash Tinting In Kurla | Victress Beauty Lounge
Author: victress

12. How Indian Young Women Are Empowered By The Pageant
Author: rishika

13. How To Use Clippers To Cut Hair: A Step-by-step Guide
Author: Andrew Mccann

14. How To Choose The Best Face Moisturizer For Your Skin Type
Author: Forever52

15. What Are The Different Types Of Massages Available At Premium Massage Center In Bahrain?
Author: Premium massage center in Bahrain

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: