How do hackers, who now abound on the Web, operate to find victims and dispossess them of their data?
By studying attacks carried out on the Google cloud, cybersecurity experts at Google Threat Intelligence have managed to identify a "popular" method.
Experts have found that hackers only need 30 minutes to locate a vulnerable cloud and hack it, reports
01net
.
"The public IP address space is systematically scanned for vulnerable cloud instances," indicates the Google Threat Horizons report published at the end of November.
“So the question is not whether a vulnerable cloud instance will be detected, but rather when.
"
Cryptocurrency mining
Hackers are in fact constantly looking for connected targets.
Once in the victim's cloud, hackers immediately install cryptocurrency mining software 86% of the time.
This installation would take only 30 seconds.
In 48% of cases, the vulnerability of the hacked cloud comes from the password chosen by its administrator.
To remedy this, simply replace it with a very strong password.
The problem can also come from a flaw or a bad configuration.
High-Tech
Personal data: Towards the creation of a "cyberscore" to inform Internet users?
High-Tech
Android: Vulnerabilities allow many smartphones to be spied, update required
High-Tech
Password
Piracy
Cyber attack
Hacker
Google
Cloud
0 comment
0 share
Share on Messenger
Share on Facebook
Share on twitter
Share on Flipboard
Share on Pinterest
Share on Linkedin
Send by Mail
To safeguard
A fault ?
To print