- The Google team published a report stating hackers are exploiting poorly set up cloud accounts to mine crypto.
- The hackers utilized accounts to acquire access to resources from users’ CPUs or GPUs to mine tokens.
- The two common objectives of the hackers are “obtaining profit” and “traffic pumping.”
Google‘s Cybersecurity Action Team released a report targeted at analyzing threats to Cloud users that hackers are mining crypto through “poorly set up” accounts.
According to the Google report, 86 percent of 50 occurrences demonstrated that hackers were mining cryptocurrency with compromised cloud accounts.
The hackers used the Cloud accounts to acquire access to resources from users’ CPUs or GPUs in order to mine tokens. It also enabled them to take full advantage of storage space when mining Chia Network coins.
As stated in the report, the two common objectives of this conduct are “obtaining profit” and “traffic pumping.”
In terms of attack methods, Google claimed that the majority of cases involved “poor” Cloud user or third-party application practices that caused vulnerabilities.
The majority of these occurrences involved the hackers downloading crypto mining software to the hacked accounts in under 22 seconds.
It would have been impossible to stop the strikes manually because they were scripted. Additionally, the hackers checked other publicly available resources on the Internet in 10% of these events to locate vulnerable systems.
The report issued by the Google Cybersecurity Action Team aims “to provide actionable intelligence that enables organizations to ensure their cloud environments are best protected,” Google stated.