Google warns that cyber hackers are using compromised cloud accounts to mine cryptocurrencies.
Details of mining hacks are included in a report by Google’s cybersecurity action team. This report provides advice on how Google can identify and address hacking threats to cloud services, which are remote storage systems that store customer data and files offsite.
Other threats identified by the team in the initial threat horizon report include: A Russian national hacker trying to get a user’s password, warning that he is the target of a government-sponsored attacker. A North Korean hacker disguised as a Samsung recruiter. Use of advanced encryption in ransomware attacks.
Mining is the name of the process that regulates and validates blockchains, such as the blockchains that underpin cryptocurrencies, and requires a great deal of computing power. Google reported that out of the last 50 hacks of cloud computing services, more than 80% were used to perform cryptocurrency mining.
Q & A What is blockchain technology?
Blockchain is a digital ledger that provides a secure way to create and record transactions, contracts, and contracts. However, the database is shared across your computer’s network, rather than being stored in one place like a traditional ledger.
This network can contain only a handful of users, or hundreds or thousands of people. The ledger is a long list of transactions that have occurred since the start of the network and grows over time.
The blockchain database consists of blocks and transactions. The block contains a batch of hashed and encoded transactions. Each block contains a hash of the previous block. This links the two to form a chain. This process validates each block to the original block and is essential for database security.
Blockchain technology has been around for years, and the most well-known use to date is the cryptocurrency Bitcoin. However, the use of blockchain is not limited to financial transactions, and enthusiasts are looking at other applications of this technology, especially the types of transactions that frequently have conflict and trust issues.
Thank you for your feedback.
According to reports, 86% of compromised Google Cloud instances are used to perform cryptocurrency mining, a cloud resource-intensive commercial activity, and in most cases cryptocurrency mining software has been used since the account was compromised. He added that it was downloaded within 22 seconds. .. In three-quarters of cloud hacks, Google said attackers exploited inadequate customer security or vulnerable third-party software.
Google’s recommendations for improved security for cloud customers include two-factor authentication and an additional layer of security in addition to common usernames and passwords to sign up for a more secure security program for your enterprise. Includes doing.
Elsewhere in the report, Google said the Russian government-backed hacking group APT28 (also known as Fancy Bear) targeted 12,000 Gmail accounts and attempted a large number of phishing attempts, tricking users into passing login information. I am. The attacker tried to seduce the account owner and pass the details via email such as: A government-backed attacker may be trying to trick you into getting your account password. Google said it blocked all phishing emails with attacks focused on the UK, US and India, and that user details were not compromised.
Another hacking trick reported by Google in the report included a North Korean-backed hacker group pretending to be a Samsung recruiter and sending fake employment opportunities to employees of a South Korean information security company. rice field. The victim was then directed to a malicious link to malware stored on Google Drive, which is currently blocked.
Google said it would be difficult to deal with ransomware attacks where files and data on a user’s computer would be encrypted by an attacker until the release was paid for. This report shows the emergence of Black Matter, described as a dreaded ransomware family.
But earlier in the month, Black Matter said it was closed due to pressure from authorities. Victims of Black Matter include the Japanese technology group Olympus.
According to a Google report: Google has been informed that the Black Lives Matter Ransomware Group has announced that it will be shut down due to external pressure. Until this is confirmed, Black Matter still poses a risk.
The mention sources can contact us to remove/changing this article
What Are The Main Benefits Of Comparing Car Insurance Quotes Online
LOS ANGELES, CA / ACCESSWIRE / June 24, 2020, / Compare-autoinsurance.Org has launched a new blog post that presents the main benefits of comparing multiple car insurance quotes. For more info and free online quotes, please visit https://compare-autoinsurance.Org/the-advantages-of-comparing-prices-with-car-insurance-quotes-online/ The modern society has numerous technological advantages. One important advantage is the speed at which information is sent and received. With the help of the internet, the shopping habits of many persons have drastically changed. The car insurance industry hasn't remained untouched by these changes. On the internet, drivers can compare insurance prices and find out which sellers have the best offers. View photos The advantages of comparing online car insurance quotes are the following: Online quotes can be obtained from anywhere and at any time. Unlike physical insurance agencies, websites don't have a specific schedule and they are available at any time. Drivers that have busy working schedules, can compare quotes from anywhere and at any time, even at midnight. Multiple choices. Almost all insurance providers, no matter if they are well-known brands or just local insurers, have an online presence. Online quotes will allow policyholders the chance to discover multiple insurance companies and check their prices. Drivers are no longer required to get quotes from just a few known insurance companies. Also, local and regional insurers can provide lower insurance rates for the same services. Accurate insurance estimates. Online quotes can only be accurate if the customers provide accurate and real info about their car models and driving history. Lying about past driving incidents can make the price estimates to be lower, but when dealing with an insurance company lying to them is useless. Usually, insurance companies will do research about a potential customer before granting him coverage. Online quotes can be sorted easily. Although drivers are recommended to not choose a policy just based on its price, drivers can easily sort quotes by insurance price. Using brokerage websites will allow drivers to get quotes from multiple insurers, thus making the comparison faster and easier. For additional info, money-saving tips, and free car insurance quotes, visit https://compare-autoinsurance.Org/ Compare-autoinsurance.Org is an online provider of life, home, health, and auto insurance quotes. This website is unique because it does not simply stick to one kind of insurance provider, but brings the clients the best deals from many different online insurance carriers. In this way, clients have access to offers from multiple carriers all in one place: this website. On this site, customers have access to quotes for insurance plans from various agencies, such as local or nationwide agencies, brand names insurance companies, etc. "Online quotes can easily help drivers obtain better car insurance deals. All they have to do is to complete an online form with accurate and real info, then compare prices", said Russell Rabichev, Marketing Director of Internet Marketing Company. CONTACT: Company Name: Internet Marketing CompanyPerson for contact Name: Gurgu CPhone Number: (818) 359-3898Email: [email protected]: https://compare-autoinsurance.Org/ SOURCE: Compare-autoinsurance.Org View source version on accesswire.Com:https://www.Accesswire.Com/595055/What-Are-The-Main-Benefits-Of-Comparing-Car-Insurance-Quotes-Online View photos
to request, modification Contact us at Here or [email protected]