Google: Half of compromised cloud instances have weak or no passwords

0
169

Liam Tung

By

Liam Tung

| November 26, 2021

| Topic: Security

The dark web targets the cloud

Watch Now

Online criminals are deploying cryptocurrency miners within just 22 seconds of compromising misconfigured cloud instances running on Google Cloud Platform (GCP).

Cryptocurrency mining is by far the main malicious activity conducted by attackers after taking advantage of misconfigured instances hosted on GCP, making up 86% of all actions carried out after compromise. 

And in many cases, the attackers move extremely quickly after compromising an instance and installing cryptomining malware to free-ride off others’ CPU and GPU resources to turn a profit for themselves. 

Security TV

|
Data Management

|
CXO

|
Data Centers