Criminals mining crypto with stolen GPU power may need to up their game as Google launches a new cloud security protocol. Google Cloud users can now heave a sigh of relief as they may no longer be at the mercy of cybercriminals.
Anonymous Protection Against Crypto-Jackers
The search engine’s cybersecurity team has launched a security protocol that protects ‘easily hacked’ accounts from cybercriminals. The new security protocol, aptly named the Virtual Machine Threat detection (VMTD), is available in the security command section of Google cloud.
This new security protocol scans Google cloud computer engines to identify possible threats, especially malicious software for crypto mining purposes. There have been several reports of malicious software attacks for crypto mining purposes (often termed crypto-jacking), especially in the last 12 months.
Before cloud-related crypto-jacking became popular between late 2020 and last year, most crypto-jacking was initiated through browsers. As widely reported late last year, 87% of malware attacks on Google cloud accounts were associated with crypto mining.
The Hacking Process
A Google report on cloud attack threats revealed that attackers usually hack GPU space for crypto mining purposes to optimize their crypto mining operations. This report moved Google’s cybersecurity team to make a move to develop the new security protocol so that its cloud users can be better protected.
Thus, the team developed the VMTD, a protocol that scans ‘weak’ cloud accounts to identify any possible threat, including the stealing of GPU power. While the VMTD was primarily developed to protect users from crypto mining attacks, the protocol also protects cloud accounts from ransomware attacks and data loss.
The Rising Popularity Of Crypto-Related Attacks
Ransomware attacks were one of the most popular cyber-attacks last year. These attacks peaked in April last year when most digital assets set new peak prices. However, there were fewer such attacks as the year came to an end, probably due to the combined efforts of the industry participants, private networks such as Google, and constituted authorities.
Google’s efforts in combating crypto-jacking issues are primarily to protect many ignorant cloud user accounts from crypto miners using their GPU power without their knowledge. The platform’s official YouTube channel recently disclosed that crypto-jacking affected nearly 60% of businesses globally three years ago.
Google’s cybersecurity team continues to upgrade the VMTD to enhance its capabilities for Google cloud user accounts. The upgrades are scheduled to be released in batches over the coming months of the year.
Important Features Of The VMTD
According to Google’s official statement on this new protocol, the software will work effectively without depending on any other software. Thus, the protocol can work without affecting the performance of the cloud account or exposing the threat detection operations to possible cybercriminals.
One of Google cloud’s top executives, Sunil Potti, revealed that the “protocol was developed based on the mode of operation of crypto hackers.” He further disclosed that Google’s security protocols aim to protect users anonymously and only provide users with necessary information on how to protect their accounts.
HeraldSheets.com produces top quality content for crypto companies. We provide brand exposure for hundreds of companies. All of our clients appreciate our services. If you have any questions you may contact us easily with Herald Sheets Facebook Messenger App. Cryptocurrencies and Digital tokens are highly volatile, conduct your own research before making any investment decisions. Some of the posts on this website are guest posts or paid posts that are not written by our authors and the views expressed in them do not reflect the views of this website. Herald Sheets is not responsible for the content, accuracy, quality, advertising, products or any other content posted on the site. Read full terms and conditions / disclaimer.