Home > News content

Hacker invasion Google Cloud instance is only for excavating encrypted currency?

via:cnBeta     time:2021/11/28 11:05:45     readed:102

Google's latest released "November 2021 Threat Horizons" report shows that a large number of invaded Google Cloud instances are used to excavate the encrypted currency.The report shows that more than 86% of the 50 Google Cloud instances recently invaded are used to encrypt monetary excavation; although hackers can leave any encrypted currencies they excavated, the victims of attacks must be used Currency payment.

The reason for the invasion attackGoogle indicates that the user account password of 48% instance is weak or no password, or there is no API authentication, and 26% of the event is due to the vulnerability of third-party software in the cloud, 12% is due to & quot; Other questions & quot; Another 12% is due to the error configuration of cloud instance or third-party software, only 4% of hackers are due to leakage credentials, such as the key to Github.

Google believes that many attacks are scripts, no artificial intervention, because in 58%, it is noted that mining software is downloaded to instances within 22 seconds of invasion.It said that manual response is almost impossible, so users should make sure that their system has no vulnerability, or there is an automated system to block attacks.

In most cases, the victim is not specially selected by hackers. Instead, they will scan Google Cloud IP and find any vulnerable systems. Google said that unsafe instances can become an attack target in just 30 minutes, so it is very important to follow best practices.

translate engine: Google

China IT News APP

Download China IT News APP

Please rate this news

The average score will be displayed after you score.

Post comment

Do not see clearly? Click for a new code.

User comments