Threat actors often attack cloud services for several illicit purposes. Google Cloud is targeted due to its extensive and powerful resources, which could be abused for a multitude of malicious activities.
The vast amounts of data and computing power that Google Cloud services provide often lure threat actors. Due to the complexity of cloud environments, this can also enable them to go undetected.
The Google Cloud Threat Horizons recently unveiled that hackers have been actively abusing the Google Cloud for phishing.
The Google Cloud Threat Horizons Report, drawn from various Google teams, such as TAG and Mandiant, discloses strategic intelligence concerning cloud security threats across providers.
Join our free webinar to learn about combating slow DDoS attacks, a major threat today.
It points out serverless computing as a transformative concept that could be fragile.
Three key areas of focus for cloud security professionals need to be considered when developing strategies to address emerging serverless cloud threats. These include mitigating risks deriving from customer misconfigurations while taking advantage of expandability and reduced operational overheads.
Here below, we have mentioned the considerations that need to be prioritized:-
In H1 2024, Google Cloud Office of the Cloud CISO conducted a deep investigation into cloud security incidents based on data from a Google Security Operations Center.
The research showed that weak or no password remained the first major path to illicit entry, while misconfigurations hit over 30% of cases and mostly involved free service account keys.
Cryptomining continued to be the principal motive for intrusions at 59%, slightly down from 65% in H2 2023.
These discoveries are significant as they show how serverless computing can help with some configuration-related vulnerabilities and why it is important in a comprehensive defense-in-depth strategy.
In this respect, the analysis highlights how organizations should prioritize credential management over other issues, observe strict configurations, and adopt serverless architectures to improve their cloud security maturity models against emerging threats.
Serverless computing, though it offers many benefits, requires a security-first approach from its beginning.
This analysis by Mandiant over two years has indicated crucial risks that serverless architecture faces across cloud providers.
These comprise hard-coded and clear-text secrets that can result in unauthorized access, threat actors taking advantage of serverless infrastructure to carry out malicious activities, which could use its scalability against it to launch attacks, unsafe design and development practices introducing vulnerabilities as well as misconfigured back-end services exposing sensitive data or functionalities.
Organizations must take robust security measures to tackle these specific threats and properly handle serverless technology.
During the years 2023-2024, two threat actors “PINEAPPLE” and “FLUXROOT” used Google Cloud services to deliver malware that was aimed mainly at people living in Latin America.
The Google teams reacted by setting up detection capabilities, obstructing the malicious URLs, and suspending associated projects, which dramatically shortened the campaign’s efficacy.
Here below, we have mentioned all the mitigations:-
Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo
Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top five…
BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using spearphishing…
Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to the…
Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection with…
The open-source tech landscape continues to innovate, and the release of the CapibaraZero firmware marks…
SonicWall has issued a critical alert regarding multiple vulnerabilities in its Secure Mobile Access (SMA)…