How do hackers, who now abound on the Web, operate to find victims and dispossess them of their data?

By studying attacks carried out on the Google cloud, cybersecurity experts at Google Threat Intelligence have managed to identify a "popular" method.

Experts have found that hackers only need 30 minutes to locate a vulnerable cloud and hack it, reports 

01net

.

"The public IP address space is systematically scanned for vulnerable cloud instances," indicates the Google Threat Horizons report published at the end of November.

“So the question is not whether a vulnerable cloud instance will be detected, but rather when.

"

Cryptocurrency mining

Hackers are in fact constantly looking for connected targets.

Once in the victim's cloud, hackers immediately install cryptocurrency mining software 86% of the time.

This installation would take only 30 seconds.

In 48% of cases, the vulnerability of the hacked cloud comes from the password chosen by its administrator.

To remedy this, simply replace it with a very strong password.

The problem can also come from a flaw or a bad configuration.

High-Tech

Personal data: Towards the creation of a "cyberscore" to inform Internet users?

High-Tech

Android: Vulnerabilities allow many smartphones to be spied, update required

  • High-Tech

  • Password

  • Piracy

  • Cyber ​​attack

  • Hacker

  • Google

  • Cloud

  • 0 comment

  • 0 share

    • Share on Messenger

    • Share on Facebook

    • Share on twitter

    • Share on Flipboard

    • Share on Pinterest

    • Share on Linkedin

    • Send by Mail

  • To safeguard

  • A fault ?

  • To print