Security News > 2023 > March > Experts Reveal Google Cloud Platform's Blind Spot for Data Exfiltration Attacks
Malicious actors can take advantage of "Insufficient" forensic visibility into Google Cloud Platform to exfiltrate sensitive data, a new research has found.
"Unfortunately, GCP does not provide the level of visibility in its storage logs that is needed to allow any effective forensic investigation, making organizations blind to potential data exfiltration attacks," cloud incident response firm Mitiga said in a report.
"The same event is used for a wide variety of types of access, including: Reading a file, downloading a file, copying a file to an external server, [and] reading the metadata of the file," Mitiga researcher Veronica Marinov said.
In a hypothetical attack, a threat actor can use Google's command line interface to transfer valuable data from the victim organization's storage buckets to an external storage bucket within the attacker organization.
Google has since provided mitigation recommendations, which range from Virtual Private Cloud Service Controls to using organization restriction headers to restrict cloud resource requests.
The disclosure comes as Sysdig unearthed a sophisticated attack campaign dubbed SCARLETEEL that's targeting containerized environments to perpetrate theft of proprietary data and software.
News URL
https://thehackernews.com/2023/03/experts-reveal-google-cloud-platforms.html
Related news
- Google Cloud Strengthens Backup Service With Untouchable Vaults (source)
- Google Cloud Document AI flaw (still) allows data theft despite bounty payout (source)
- Google Cloud Expands Confidential Computing Portfolio (source)
- Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks (source)
- Embargo ransomware escalates attacks to cloud environments (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- Samsung phone users under attack, Google warns (source)
- Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining (source)