123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Beauty >> View Article

Google Warns 'malicious Actors' Performing Crypto Mining Using Compromised Cloud Accounts

Profile Picture
By Author: Greg C. Ryan
Total Articles: 20
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

On Wednesday software giant Google issued latest cloud threat Intelligence report titled “Threat Horizons” report raising awareness among users and intelligence regarding security weaknesses in its platform.

As per Google around 86% of 50 recently compromised accounts are being used for malicious activity purpose. It also refers about malicious actors using compromised Google Cloud accounts for mining cryptocurrencies Chia, which use storage space as a mining resource. In the most of studied cases within 22 seconds of the account being compromised, cryptocurrency mining software was being downloaded. Within eight hours of being deployed 40% of the unsecured instances were being compromised. As per Google this reflects that malicious actor were tracking these unsecured Google instances actively and were systematically attacking these unsecured instances with only aiming to use it for this purpose. Google Cloud accounts is a remote storage platform for users to keep data and files off-site and hence have access to processing power that can be easily redirected to perform malicious tasks. To identify vulnerable systems ...
... around 10% of the compromised accounts were also used to conduct scans of other publicly available resources on the internet while 8% of instances were used to attack other targets.

Google states “This suggests that the public IP address space is routinely scanned for vulnerable Cloud instances. It will not be a matter of if a vulnerable Cloud instance is detected, but rather when”. Seth Rosenblatt, security editor at Google Cloud, in a blog post and Bob Mechler, director of the office of the chief information security officer at Google Cloud said, "The cloud threat landscape in 2021 was more complex than just rogue cryptocurrency miners, of course,"

More About the Author

I am an external analyst and working as a content writer

Total Views: 133Word Count: 274See All articles From Author

Add Comment

Beauty Articles

1. Lumoava Korut: Ainutlaatuinen Ja Lumoava Valinta
Author: kajus

2. What Are The Benefits Of Using A Night Moisturizer?
Author: cossouq

3. Transformative Solutions For Leucoderma: Enhancing Quality Of Life
Author: mayra singh

4. Which Is Better Hyaluronic Acid Or Vitamin C Serum
Author: Mark Bruce

5. Sleek And Stylish: Discovering The Best Straighteners For Perfect Hair
Author: cossouq

6. Is Led Light Therapy Face Mask The Best Investment To Get Salon-like Benefits At Home?
Author: Mojia Australia

7. Unveiling Beauty: The Essence Of A Premier Salon Experience In Doha, Qatar
Author: embelliesalon

8. Kalista Beyond Hair: Unleash Your Style: Expert Hair Coloring
Author: Kalista

9. 10 Common Myths About Tretinoin Cream Debunked
Author: richard

10. Discover The Power Of Tazret Forte Cream: Your Key To Clear, Radiant Skin
Author: Dermacarehub

11. Discovering The Solution To Hair Rejuvenation With Korean Hair Regrowth Serum
Author: amna

12. Hair Wax
Author: Julian

13. Menopause And Hair Loss
Author: Kenny English

14. Score Stylish Savings: Overstock Fashion Deals On Scarves And Sunglasses
Author: Sarah Smith

15. Skin And Sun Care Active Ingredients Suitable For The Middle East Market
Author: Sarah Weber

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: