Hackers Abusing Google Cloud For Phishing

Threat actors often attack cloud services for several illicit purposes. Google Cloud is targeted due to its extensive and powerful resources, which could be abused for a multitude of malicious activities.

The vast amounts of data and computing power that Google Cloud services provide often lure threat actors. Due to the complexity of cloud environments, this can also enable them to go undetected.

The Google Cloud Threat Horizons recently unveiled that hackers have been actively abusing the Google Cloud for phishing.

Google Cloud For Phishing

The Google Cloud Threat Horizons Report, drawn from various Google teams, such as TAG and Mandiant, discloses strategic intelligence concerning cloud security threats across providers.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

It points out serverless computing as a transformative concept that could be fragile.

Three key areas of focus for cloud security professionals need to be considered when developing strategies to address emerging serverless cloud threats. These include mitigating risks deriving from customer misconfigurations while taking advantage of expandability and reduced operational overheads.

Here below, we have mentioned the considerations that need to be prioritized:-

  • Compromised credentials
  • Exploited misconfiguration
  • Distribution of malware

In H1 2024, Google Cloud Office of the Cloud CISO conducted a deep investigation into cloud security incidents based on data from a Google Security Operations Center.

The research showed that weak or no password remained the first major path to illicit entry, while misconfigurations hit over 30% of cases and mostly involved free service account keys.

Initial Access Vectors of Concern (H1 2024) (Source – Google Threat Horizon)

Cryptomining continued to be the principal motive for intrusions at 59%, slightly down from 65% in H2 2023.

Observed Impact of Intrusion (H1 2024) (Source – Google Threat Horizon)

These discoveries are significant as they show how serverless computing can help with some configuration-related vulnerabilities and why it is important in a comprehensive defense-in-depth strategy.

In this respect, the analysis highlights how organizations should prioritize credential management over other issues, observe strict configurations, and adopt serverless architectures to improve their cloud security maturity models against emerging threats.

Serverless computing, though it offers many benefits, requires a security-first approach from its beginning.

This analysis by Mandiant over two years has indicated crucial risks that serverless architecture faces across cloud providers.

These comprise hard-coded and clear-text secrets that can result in unauthorized access, threat actors taking advantage of serverless infrastructure to carry out malicious activities, which could use its scalability against it to launch attacks, unsafe design and development practices introducing vulnerabilities as well as misconfigured back-end services exposing sensitive data or functionalities.

Organizations must take robust security measures to tackle these specific threats and properly handle serverless technology.

During the years 2023-2024, two threat actors “PINEAPPLE” and “FLUXROOT” used Google Cloud services to deliver malware that was aimed mainly at people living in Latin America. 

The Google teams reacted by setting up detection capabilities, obstructing the malicious URLs, and suspending associated projects, which dramatically shortened the campaign’s efficacy.

Mitigations

Here below, we have mentioned all the mitigations:-

  • Manage high-privilege accounts strictly.
  • Apply least privilege principles.
  • Implement malware detection controls.
  • Collaborate with CISA for malware analysis.
  • Monitor for leaked credentials.
  • Develop credential reset playbooks.
  • Use Container Threat Detection.
  • Avoid untrusted containers.
  • Configure Cloud Functions network settings.
  • Control network ingress and egress for Cloud Run.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Tushar Subhra

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top five…

15 hours ago

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using spearphishing…

15 hours ago

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication

Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to the…

15 hours ago

Sophisticated Celestial Stealer Targets Browsers to Steal Login Credentials

Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection with…

16 hours ago

CapibaraZero Firmware With ESP32-S3 Hardware Enables Low Cost Flipper Zero alternative

The open-source tech landscape continues to innovate, and the release of the CapibaraZero firmware marks…

17 hours ago

Multiple SonicWall Vulnerabilities Let Attackers Execute Remote Code

SonicWall has issued a critical alert regarding multiple vulnerabilities in its Secure Mobile Access (SMA)…

18 hours ago