Security Alerts blog

“Cryptic Clouds” Hacker’s Compromise Google Cloud Accounts to Mine Cryptocurrency

Threat actors are actively exploiting a misconfigured Google Cloud Platform (GCP) infrastructure to mine cryptocurrency. Google’s recent threat horizon report detailed that out of 50 recently compromised GCP instances, 86% were used for crypto mining.

Statistics show that 48% of intrusions were the result of poor password hygiene and or insecure API configurations. However, 26% were found to be the result of vulnerabilities in third-party dependencies and 4% were the result of credentials leaked in Git projects.

Additionally, threat actors are abusing GCP instances in ransomware attacks, staging phishing campaigns and even generating traffic to specific YouTube videos to manipulate statistics.

The impact:

The following is an inexhaustive list of consequences, as a result, of a compromised GCP environment:

  • Financial damages: IBM found that the average cost of a data breach in 2021 was 4.24 million USD
  • Reputational damage
  • Potential legal repercussions

Further compromise and attacks e.g. ransomware

The remediation:

Below are some recommendations to help the security posture a cloud environment, along with some references for further reading.

  • Implement robust Identity Access Management (IAM). Use a least-privileged approach and ensure that privileges are aligned with job role functionality. Apply policies across the organisation to ensure coverage
  • Have visibility over your assets, this can be achieved using your cloud platforms command centre
  • Ensure there are no hardcoded credentials or API keys in development projects

For information on the Google Cloud Platform misconfiguration and cloud security best practices, please see the links below:

Source: thehackernews.com

Risk Crew

Share
Published by
Risk Crew
Tags: alertsGoogle

Recent Posts

ISO 42001: Key Insights You Need to Know

Introducing ISO 42001 – the world’s first international management system standard focused specifically on AI.…

2 months ago

ISO 27001 Requirements | Your Roadmap to Compliance

Data breaches and cyberattacks have become daily concerns for information security professionals and business leaders.…

2 months ago

How to Get Ready for a Penetration Test

It is an undeniable fact that all applications and infrastructures are essentially in need of…

4 months ago