Google Cloud is adding crypto-mining malware threat detection service (2024)

Google Cloud on Monday unveiled Virtual Machine Threat Detection (VMTD), which will detect any malware that mines cryptocurrency on a compromised Cloud account. “VMTD is a first-to-market detection capability from a major cloud provider that provides agentless memory scanning to help detect threats like crypto-mining malware inside your virtual machines running in Google Cloud,” according to a blog post from Google.

This development comes after the company said in November that cyber criminals were hacking Google cloud accounts to mine cryptocurrency. Google’s cloud service is the one of the most popular remote storage system, where the tech giant stores customers’ data and files in a remote server—which is technically capable of being used for crypto mining. Cryptocurrency mining requires high-powered computers, that are competing to solve complex mathematical puzzles, in a process that makes intensive use of computing power and electricity.

What is VMTD?

VMTD will be able to protect Google Cloud Platform customers against attacks such as data exfiltration and ransomware, the blog said. In terms of detecting crypto mining activities, VMTD will work without the need for an additional software. The measure is being rolled out as “public preview”, meaning that users are allowed to explore the feature and even send feedback of the newly added feature. Google will integrate VMTD with other parts of its service over the next few months.

To enable VMTD on your Cloud, open the Settings page in Security Command Center. Click on “Manage Settings” under Virtual Machine Threat Detection. You can then select a scope for VMTD.

Interestingly, Google noted that of 50 percent hacks of its cloud computing service, more than 80 percent were used to perform cryptocurrency mining. Cloud customers continue to face a variety of threats across applications and infrastructure, and many successful attacks are “due to poor hygiene and a lack of basic control implementation,” Google said in its blog post.

Additionally, 10 percent of compromised Cloud instances were used to conduct scans of other publicly available resources on the internet to identify vulnerable systems, and 8 percent of instances were used to attack other targets. “While data theft did not appear to be the objective of these compromises, it remains a risk associated with the cloud asset compromises as bad actors start performing multiple forms of abuse,” Google added.

Google Cloud is adding crypto-mining malware threat detection service (2024)

FAQs

Is crypto mining allowed on Google Cloud? ›

You may not use the Free Trial Services to engage in mining cryptocurrency. You must obtain Google's prior written approval before you can engage in any cryptocurrency mining activities. Blockchain activities that are not resource-intensive, such as Proof of Stake (PoS), do not require verification.

How do I know if I have crypto mining malware? ›

The only signs they might notice is slower performance, lags in execution, overheating, excessive power consumption, or abnormally high cloud computing bills.

How does Google detect crypto mining? ›

Named Virtual Machine Threat Detection (VMTD), Google said this new feature is an agentless system that continually scans the memory of virtual machines deployed in Google Cloud environments for tell-tale signs of increased CPU or GPU usage—specific to cryptomining operations.

What is crypto mining malware? ›

Cryptomining malware, or 'cryptojacking,' is a malware attack that co-opts the target's computing resources in order to mine cryptocurrencies like bitcoin. This malware uses a systems CPU and sometimes GPU to perform complex mathematical calculations that result in long alphanumeric strings called hashes.

Did Google warn crypto miners are using compromised cloud accounts? ›

Crypto Miners Hacking Google Accounts

In the report, the cybersecurity team analyzed 50 recently compromised Google Cloud accounts. And out of those, 86% were related to crypto mining. “Malicious actors were observed performing cryptocurrency mining within compromised Cloud instances,” Google wrote.

Is cloud mining trusted? ›

While most cloud mining sites are a scam, there are many that work, gauged on the profitability, fair pricing, and actual payouts on their contracts – as long as you can purchase profitable hash rates with them.

Top Articles
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 6068

Rating: 4.6 / 5 (76 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.