Criminals mining crypto with stolen GPU power may need to up their game as Google launches a new cloud security protocol. Google Cloud users can now heave a sigh of relief as they may no longer be at the mercy of cybercriminals. 

Anonymous Protection Against Crypto-Jackers

The search engine’s cybersecurity team has launched a security protocol that protects ‘easily hacked’ accounts from cybercriminals. The new security protocol, aptly named the Virtual Machine Threat detection (VMTD), is available in the security command section of Google cloud.

This new security protocol scans Google cloud computer engines to identify possible threats, especially malicious software for crypto mining purposes. There have been several reports of malicious software attacks for crypto mining purposes (often termed crypto-jacking), especially in the last 12 months.

Before cloud-related crypto-jacking became popular between late 2020 and last year, most crypto-jacking was initiated through browsers. As widely reported late last year, 87% of malware attacks on Google cloud accounts were associated with crypto mining.

The Hacking Process

A Google report on cloud attack threats revealed that attackers usually hack GPU space for crypto mining purposes to optimize their crypto mining operations. This report moved Google’s cybersecurity team to make a move to develop the new security protocol so that its cloud users can be better protected. 

Thus, the team developed the VMTD, a protocol that scans ‘weak’ cloud accounts to identify any possible threat, including the stealing of GPU power. While the VMTD was primarily developed to protect users from crypto mining attacks, the protocol also protects cloud accounts from ransomware attacks and data loss.

The Rising Popularity Of Crypto-Related Attacks

Ransomware attacks were one of the most popular cyber-attacks last year. These attacks peaked in April last year when most digital assets set new peak prices. However, there were fewer such attacks as the year came to an end, probably due to the combined efforts of the industry participants, private networks such as Google, and constituted authorities.

Google’s efforts in combating crypto-jacking issues are primarily to protect many ignorant cloud user accounts from crypto miners using their GPU power without their knowledge. The platform’s official YouTube channel recently disclosed that crypto-jacking affected nearly 60% of businesses globally three years ago.

Google’s cybersecurity team continues to upgrade the VMTD to enhance its capabilities for Google cloud user accounts. The upgrades are scheduled to be released in batches over the coming months of the year.

Important Features Of The VMTD   

According to Google’s official statement on this new protocol, the software will work effectively without depending on any other software. Thus, the protocol can work without affecting the performance of the cloud account or exposing the threat detection operations to possible cybercriminals.

One of Google cloud’s top executives, Sunil Potti, revealed that the “protocol was developed based on the mode of operation of crypto hackers.” He further disclosed that Google’s security protocols aim to protect users anonymously and only provide users with necessary information on how to protect their accounts.

Alicia Maher

By Alicia Maher

Alicia Maher is an accomplished news writer with a passion for storytelling. With years of experience in the field, she is skilled at delivering accurate, engaging, and insightful news coverage to her audience.