Security News > 2023 > March > Experts Reveal Google Cloud Platform's Blind Spot for Data Exfiltration Attacks
Malicious actors can take advantage of "Insufficient" forensic visibility into Google Cloud Platform to exfiltrate sensitive data, a new research has found.
"Unfortunately, GCP does not provide the level of visibility in its storage logs that is needed to allow any effective forensic investigation, making organizations blind to potential data exfiltration attacks," cloud incident response firm Mitiga said in a report.
"The same event is used for a wide variety of types of access, including: Reading a file, downloading a file, copying a file to an external server, [and] reading the metadata of the file," Mitiga researcher Veronica Marinov said.
In a hypothetical attack, a threat actor can use Google's command line interface to transfer valuable data from the victim organization's storage buckets to an external storage bucket within the attacker organization.
Google has since provided mitigation recommendations, which range from Virtual Private Cloud Service Controls to using organization restriction headers to restrict cloud resource requests.
The disclosure comes as Sysdig unearthed a sophisticated attack campaign dubbed SCARLETEEL that's targeting containerized environments to perpetrate theft of proprietary data and software.
News URL
https://thehackernews.com/2023/03/experts-reveal-google-cloud-platforms.html
Related news
- Google Cloud/Cloud Security Alliance Report: IT and Security Pros Are ‘Cautiously Optimistic’ About AI (source)
- Google Cloud Next 2024: New Data Center Chip and Chrome Enterprise Premium Join the Ecosystem (source)
- How much does cloud-based identity expand your attack surface? (source)
- Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks (source)
- Google Chrome Adds V8 Sandbox - A New Defense Against Browser Attacks (source)
- Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks (source)