{"id":14168,"date":"2021-11-26T22:31:51","date_gmt":"2021-11-26T21:31:51","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=14168"},"modified":"2021-11-26T22:31:59","modified_gmt":"2021-11-26T21:31:59","slug":"report-reveals-hackers-can-use-compromised-google-cloud-accounts-to-install-mining-software","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/report-reveals-hackers-can-use-compromised-google-cloud-accounts-to-install-mining-software\/","title":{"rendered":"Report reveals hackers can use compromised Google Cloud accounts to install mining software"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">The perpetrators frequently acquired access to <a href=\"https:\/\/coinscreed.com\/staging\/visa-acquires-fintech-platform-currencycloud.html\" data-type=\"post\" data-id=\"6554\">Cloud <\/a>accounts through &#8220;poor customer security practices&#8221; or &#8220;weak third-party applications,&#8221; according to the study.<\/h5>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"877\" height=\"603\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/11\/image-97.png\" alt=\"Report reveals hackers can use compromised Google Cloud accounts to install mining software \" class=\"wp-image-14169\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/11\/image-97.png 877w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/11\/image-97-300x206.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/11\/image-97-768x528.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/11\/image-97-750x516.png 750w\" sizes=\"(max-width: 877px) 100vw, 877px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.google.com\/search?q=Report+reveals+hackers+can+use+compromised+Google+Cloud+accounts+to+install+mining+software&oq=Report+reveals+hackers+can+use+compromised+Google+Cloud+accounts+to+install+mining+software&aqs=chrome..69i57.1220j0j7&sourceid=chrome&ie=UTF-8\" data-type=\"URL\" data-id=\"https:\/\/www.google.com\/search?q=Report+reveals+hackers+can+use+compromised+Google+Cloud+accounts+to+install+mining+software&oq=Report+reveals+hackers+can+use+compromised+Google+Cloud+accounts+to+install+mining+software&aqs=chrome..69i57.1220j0j7&sourceid=chrome&ie=UTF-8\" target=\"_blank\" rel=\"noopener\">Google<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a>&#8216;s Cybersecurity Action Team warned in a paper targeted at analyzing threats to Cloud customers that some attackers are mining cryptocurrencies via &#8220;poorly setup&#8221; accounts.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/coinscreed.com\/staging\/google-bitcoins-biggest-trend-indicator-turns-23.html\" data-type=\"post\" data-id=\"11147\">Google <\/a>team revealed on Wednesday that crypto mining was involved in 86 percent of the 50 investigated instances that affected the Google Cloud Protocol. The hackers utilized the hacked <a href=\"https:\/\/coinscreed.com\/staging\/microstrategys-stash-now-worth-7b-after-last-quarters-9000-btc-addition.html\" data-type=\"post\" data-id=\"12915\">Cloud <\/a>accounts to gain access to resources from people's CPUs or GPUs in order to mine tokens or take advantage of storage space when mining currencies on the Chia Network.<\/p>\n\n\n\n<p>However, Google's team noted that many of the intrusions were used as staging grounds for subsequent hacks and the identification of more susceptible systems, rather than being restricted to a single malevolent action like <a href=\"https:\/\/coinscreed.com\/staging\/new-york-businesses-petitions-to-deny-permits-for-crypto-mining.html\" data-type=\"post\" data-id=\"12395\">crypto mining<\/a>. The perpetrators frequently acquired access to Cloud accounts as a consequence of &#8220;poor customer security practices&#8221; or &#8220;weak third-party software,&#8221; according to the cybersecurity team.<\/p>\n\n\n\n<p>\u201cWhile data theft did not appear to be the objective of these compromises, it remains a risk associated with the Cloud asset compromises as bad actors start performing multiple forms of abuse,\u201d said the <a href=\"https:\/\/coinscreed.com\/staging\/cybersecurity-firm-kaspersky-ranks-cryptojackers-among-top-malware-threats-in-africa.html\" data-type=\"post\" data-id=\"9227\">Cybersecurity <\/a>Action Team. \u201cThe public Internet-facing Cloud instances were open to scanning and brute force attacks.\u201d<\/p>\n\n\n\n<p>The attacks were also notable for their rapidity. According to Google's investigation, in the majority of the events investigated, hackers were able to download crypto mining software to the hacked accounts in under 22 seconds. &#8220;The first attacks and subsequent downloads were planned activities that did not require human interaction,&#8221; <a href=\"https:\/\/coinscreed.com\/staging\/google-bitcoins-biggest-trend-indicator-turns-23.html\" data-type=\"post\" data-id=\"11147\">Google <\/a>claimed, adding that actively intervening to halt such situations once they started would be extremely impossible.<\/p>\n\n\n\n<p>An assault on several users' Cloud accounts to obtain access to more computer power isn't a novel way to mine cryptocurrency illegally. Many in the field refer to this as &#8220;cryptojacking,&#8221; and there have been numerous high-profile examples, including a hack of Capital One in 2019 that reportedly used credit card customers' servers to mine cryptocurrency. <\/p>\n\n\n\n<p>For many users, however, browser-based cryptojacking as well as mining <a href=\"https:\/\/coinscreed.com\/staging\/new-german-govt-mentions-crypto-in-its-agreement.html\" data-type=\"post\" data-id=\"14143\">cryptocurrency <\/a>after acquiring access through fraudulent software downloads remains an issue.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The perpetrators frequently acquired access to Cloud accounts through &#8220;poor customer security practices&#8221; or &#8220;weak third-party applications,&#8221; according to the study. Google &#8216;s Cybersecurity Action Team warned in a paper targeted at analyzing threats to Cloud customers that some attackers are mining cryptocurrencies via &#8220;poorly setup&#8221; accounts. The Google team revealed on Wednesday that crypto [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":14169,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[5541],"class_list":["post-14168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-google-cloud"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/11\/image-97.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/14168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=14168"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/14168\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/14169"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=14168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=14168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=14168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}