123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Beauty >> View Article

Google Warns 'malicious Actors' Performing Crypto Mining Using Compromised Cloud Accounts

Profile Picture
By Author: Greg C. Ryan
Total Articles: 20
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

On Wednesday software giant Google issued latest cloud threat Intelligence report titled “Threat Horizons” report raising awareness among users and intelligence regarding security weaknesses in its platform.

As per Google around 86% of 50 recently compromised accounts are being used for malicious activity purpose. It also refers about malicious actors using compromised Google Cloud accounts for mining cryptocurrencies Chia, which use storage space as a mining resource. In the most of studied cases within 22 seconds of the account being compromised, cryptocurrency mining software was being downloaded. Within eight hours of being deployed 40% of the unsecured instances were being compromised. As per Google this reflects that malicious actor were tracking these unsecured Google instances actively and were systematically attacking these unsecured instances with only aiming to use it for this purpose. Google Cloud accounts is a remote storage platform for users to keep data and files off-site and hence have access to processing power that can be easily redirected to perform malicious tasks. To identify vulnerable systems ...
... around 10% of the compromised accounts were also used to conduct scans of other publicly available resources on the internet while 8% of instances were used to attack other targets.

Google states “This suggests that the public IP address space is routinely scanned for vulnerable Cloud instances. It will not be a matter of if a vulnerable Cloud instance is detected, but rather when”. Seth Rosenblatt, security editor at Google Cloud, in a blog post and Bob Mechler, director of the office of the chief information security officer at Google Cloud said, "The cloud threat landscape in 2021 was more complex than just rogue cryptocurrency miners, of course,"

More About the Author

I am an external analyst and working as a content writer

Total Views: 246Word Count: 274See All articles From Author

Add Comment

Beauty Articles

1. Discover The Natural Power Of Aromatherapy With Gya Labs Essential Oils
Author: gyalabs

2. Remy Human Hair Extensions: The Sustainability Choice For Conscious Consumers
Author: Rachel Koren

3. Rejuvenus Skin Center By Dr. Renuka Saigal – Best Skin & Hair Treatment Clinic In Ghaziabad
Author: sumit

4. Hairdresser Marina Dubai - Your Complete Guide
Author: Shams

5. How To Choose A Hair & Makeup Artist In London That Suits You
Author: Tina Prajapat Ltd

6. Residential Ev Charging Stations: Everything You Need To Know Before Buying
Author: Arjun

7. Page3 Academy: Beauty & Hair Career Development In Coimbatore
Author: Page3 Academy

8. Sustainable Sourcing Of Mica: Why That Matters For Cosmetic Pigments
Author: koel

9. Snowvique Wellness Studio – Facial Aesthetics & Naturopathy In Donnybrook
Author: Dr.ndeep Kaur

10. Redefining Aesthetic Care In Chennai - Helios Advanced Skin And Laser Clinic
Author: Helios Advanced Skin, Hair & Laser Clinic: Your De

11. Key Considerations When Selecting A Skin Care Manufacturer Overseas
Author: Kit Wilkins

12. How To Choose A Reliable Mouthwash Supplier For Your Brand
Author: Kit Wilkins

13. What Is Prp Hair Treatment And Why It Helps Regrow Hair
Author: Dermiscare

14. Discover The Best Brazilian Buttlift Surgery In Chicago
Author: Ciplasticsurgery

15. Laser Toning For Skin Rejuvenation: What You Need To Know
Author: Dermiscare

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: