In a written report aimed at assessing threats to Cloud users, Google's Cybersecurity Activeness Team said that some attackers are exploiting "poorly configured" accounts to mine cryptocurrency.

On Wednesday, the Google squad said out of 50 analyzed incidents that compromised the Google Cloud Protocol, 86% were related to crypto mining. The hackers used the compromised Cloud accounts to access resources from individuals' CPUs or GPUs to mine tokens or take reward of storage space when mining coins on the Chia Network.

Yet, Google's team reported that many of the attacks were not express to a unmarried malicious action like crypto mining, but were also staging points to conduct other hacks and identify other vulnerable systems. According to the cybersecurity team, the actors normally gained access to Cloud accounts equally a result of "poor client security practices" or "vulnerable 3rd-political party software."

"While data theft did not appear to be the objective of these compromises, information technology remains a risk associated with the Cloud asset compromises as bad actors get-go performing multiple forms of abuse," said the Cybersecurity Activeness Squad. "The public Cyberspace-facing Cloud instances were open to scanning and brute force attacks."

The speed of the attacks was as well noteworthy. According to Google's analysis, hackers were able to download crypto mining software to the compromised accounts within 22 seconds in the majority of the incidents analyzed. Google suggested that "the initial attacks and subsequent downloads were scripted events non requiring human being intervention" and said information technology would be nearly impossible to manually intervene to stop such incidents one time they started.

Related: Google bans 8 'deceptive' crypto apps from Play Store

An attack on multiple users' Deject accounts to gain access to boosted computing ability is not a new arroyo to illicitly mining crypto. "Cryptojacking," every bit information technology is known past many in the space, has had several high-profile incidents including a hack of Capital One in 2022 to allegedly apply credit carte users' servers to mine crypto. However, browser-based cryptojacking also every bit mining crypto later on gaining access through deceptive app downloads is too yet a problem for many users.