Threat actors are actively exploiting a misconfigured Google Cloud Platform (GCP) infrastructure to mine cryptocurrency. Google’s recent threat horizon report detailed that out of 50 recently compromised GCP instances, 86% were used for crypto mining.
Statistics show that 48% of intrusions were the result of poor password hygiene and or insecure API configurations. However, 26% were found to be the result of vulnerabilities in third-party dependencies and 4% were the result of credentials leaked in Git projects.
Additionally, threat actors are abusing GCP instances in ransomware attacks, staging phishing campaigns and even generating traffic to specific YouTube videos to manipulate statistics.
The following is an inexhaustive list of consequences, as a result, of a compromised GCP environment:
Further compromise and attacks e.g. ransomware
Below are some recommendations to help the security posture a cloud environment, along with some references for further reading.
For information on the Google Cloud Platform misconfiguration and cloud security best practices, please see the links below:
Source: thehackernews.com
Introducing ISO 42001 – the world’s first international management system standard focused specifically on AI.…
Data breaches and cyberattacks have become daily concerns for information security professionals and business leaders.…
It is an undeniable fact that all applications and infrastructures are essentially in need of…