{"id":477547,"date":"2021-11-28T18:00:51","date_gmt":"2021-11-28T18:00:51","guid":{"rendered":"https:\/\/uniquehot.com\/?p=477547"},"modified":"2024-06-11T11:47:00","modified_gmt":"2024-06-11T11:47:00","slug":"hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto","status":"publish","type":"post","link":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/","title":{"rendered":"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto"},"content":{"rendered":"

Attackers are exploiting poorly configured cloud accounts to mine crypto, Google warned users in a recent report<\/a>.<\/p>\n

Cryptocurrency mining is a computationally intensive activity. And Google Cloud customers can access it at a cost. However, miners are now hacking Google Cloud accounts for mining purposes.
\nIn the report titled “Threat Horizons,” Google’s cybersecurity team assessed various threats to Cloud users, providing details of the breaches.<\/p>\n

Related Reading |\u00a0Data Shows Crypto Hacks And Fraud In 2021 Are On Track For A New Record<\/a><\/em><\/strong><\/p>\n

The report also provided cybersecurity threat intelligence to cloud users. The aim is to enable them “better configure their environments and defenses in manners most specific to their needs.”<\/p>\n

Crypto Miners Hacking Google Accounts<\/span><\/h2>\n

In the report, the cybersecurity team analyzed 50 recently compromised Google Cloud accounts. And out of those, 86% were related to crypto mining. \u201cMalicious actors were observed performing cryptocurrency mining within compromised Cloud instances,\u201d Google wrote.<\/p>\n

Related Reading |\u00a0Ethereum Miner Revenue Outpaces Bitcoin In 2021<\/a><\/em><\/strong><\/p>\n

The report also stated that in the majority of these incidents, the hackers downloaded crypto mining software to the compromised accounts within 22 seconds. The attacks were scripted, and it would have been impossible to manually stop them. Additionally, in 10% of these incidents, the hackers scanned other publicly available resources on the Internet to identify vulnerable systems. While in 8% of the instances, they attacked other targets.<\/p>\n

However, as reported by the cybersecurity team, the crypto mining hacks were not the only attacks.<\/span><\/p>\n

\u201cThe cloud threat landscape in 2021 was more complex than just rogue cryptocurrency miners, of course,\u201d wrote Bob Mechler, Google Cloud Director of the office of the Chief Information Security Officer, and Seth Rosenblatt, Google Cloud Security Editor, in\u00a0<\/span>a blog post<\/span><\/a>.<\/span><\/p>\n

Other Threats To Google Cloud Users<\/span><\/h2>\n

Another threat the team identified was a phishing attack by the Russian group called APT28, or Fancy Bear. The attackers targeted 12,000 Gmail accounts in a mass phishing attempt. They attempted to trick users into handing over their login details. Google, however, said it had blocked all the phishing emails, and no user was compromised.<\/span><\/p>\n

The report also pointed out an attack by a North Korean government-backed group. This hacker group posed as Samsung recruiters, sending fake job opportunities to employees at South Korean information security companies. They attached a malicious link to malware stored in Google Drive. Google said it also blocked it.<\/span><\/p>\n

Another threat to cloud users is ransomware attacks, whereby hackers encrypt users’ data until they pay. In the report, Google mentions the formidable Black Matter ransomware group. And although the group announced that it was shutting down earlier this month, Google is still cautious. <\/span>\u201cGoogle has received reports that the Black Matter ransomware group has announced it will shut down operations given outside pressure. Until this is confirmed, Black Matter still poses a risk.\u201d<\/span><\/p>\n

\"Total<\/p>\n

Total crypto market at $2.4 Trillion | Source: Crypto Total Market Cap from TradingView.com<\/a><\/pre>\n

Google attributes some of these attacks to users’ poor security practices. And also vulnerabilities in third-party software that the users install.<\/span><\/p>\n

The report also recommends a few ways to prevent these attacks. One of which is enabling two-factor authentication.<\/span><\/p>\n

Featured image by Dreamstime, Chart from TradingView.com<\/pre>\n","protected":false},"excerpt":{"rendered":"

Attackers are exploiting poorly configured cloud accounts to mine crypto, Google warned users in a recent report. Cryptocurrency mining is a computationally intensive activity. And Google Cloud customers can access it at a cost. However, miners are now hacking Google Cloud accounts for mining purposes. In the report titled “Threat Horizons,” Google’s cybersecurity team assessed various threats to Cloud users, providing details of the breaches. Related Reading |\u00a0Data Shows Crypto Hacks And Fraud In 2021 Are On Track For A New Record The report also provided cybersecurity threat intelligence to cloud users. The aim is to enable them “better configure their environments and defenses in manners most specific to their needs.” Crypto Miners Hacking Google Accounts In the report, the cybersecurity team analyzed 50 recently compromised Google Cloud accounts. And out of those, 86% were related to crypto mining. \u201cMalicious actors were observed performing cryptocurrency mining within compromised Cloud instances,\u201d Google wrote. Related Reading |\u00a0Ethereum Miner Revenue Outpaces Bitcoin In 2021 The report also stated that in the majority of these incidents, the hackers downloaded crypto mining software to the compromised accounts within 22 seconds. The attacks were scripted, and it would have been impossible to manually stop them. Additionally, in 10% of these incidents, the hackers scanned other publicly available resources on the Internet to identify vulnerable systems. While in 8% of the instances, they attacked other targets. However, as reported by the cybersecurity team, the crypto mining hacks were not the only attacks. \u201cThe cloud threat landscape in 2021 was more complex than just rogue cryptocurrency miners, of course,\u201d wrote Bob Mechler, Google Cloud Director of the office of the Chief Information Security Officer, and Seth Rosenblatt, Google Cloud Security Editor, in\u00a0a blog post. Other Threats To Google Cloud Users Another threat the team identified was a phishing attack by the Russian group called APT28, or Fancy Bear. The attackers targeted 12,000 Gmail accounts in a mass phishing attempt. They attempted to trick users into handing over their login details. Google, however, said it had blocked all the phishing emails, and no user was compromised. The report also pointed out an attack by a North Korean government-backed group. This hacker group posed as Samsung recruiters, sending fake job opportunities to employees at South Korean information security companies. They attached a malicious link to malware stored in Google Drive. Google said it also blocked it. Another threat to cloud users is ransomware attacks, whereby hackers encrypt users’ data until they pay. In the report, Google mentions the formidable Black Matter ransomware group. And although the group announced that it was shutting down earlier this month, Google is still cautious. \u201cGoogle has received reports that the Black Matter ransomware group has announced it will shut down operations given outside pressure. Until this is confirmed, Black Matter still poses a risk.\u201d Total crypto market at $2.4 Trillion | Source: Crypto Total Market Cap from TradingView.com Google attributes some of these attacks to users’ poor security practices. And also vulnerabilities in third-party software that the users install. The report also recommends a few ways to prevent these attacks. One of which is enabling two-factor authentication. Featured image by Dreamstime, Chart from TradingView.com<\/p>\n","protected":false},"author":545,"featured_media":477549,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[11450,8557,2219,84794,2276,2282],"class_list":["post-477547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-crypto-mining","tag-cryptocurrency-mining","tag-google","tag-google-cloud","tag-hack","tag-hackers"],"acf":[],"yoast_head":"\nHackers Are Now Using Compromised Cloud Accounts To Mine Crypto<\/title>\n<meta name=\"description\" content=\"Attackers are exploiting poorly configured cloud accounts to mine crypto, Google warned users in a recent report. Cryptocurrency mining is a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto\" \/>\n<meta property=\"og:description\" content=\"Attackers are exploiting poorly configured cloud accounts to mine crypto, Google warned users in a recent report. Cryptocurrency mining is a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/\" \/>\n<meta property=\"og:site_name\" content=\"NewsBTC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/newsbtc\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-28T18:00:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-11T11:47:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tolu Okuwoga\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@newsbtc\" \/>\n<meta name=\"twitter:site\" content=\"@newsbtc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tolu Okuwoga\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/\"},\"author\":{\"name\":\"Tolu Okuwoga\",\"@id\":\"https:\/\/uniquehot.com\/#\/schema\/person\/89f403550fffa9b0c99099c7c141d886\"},\"headline\":\"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto\",\"datePublished\":\"2021-11-28T18:00:51+00:00\",\"dateModified\":\"2024-06-11T11:47:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/\"},\"wordCount\":512,\"publisher\":{\"@id\":\"https:\/\/uniquehot.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667\",\"keywords\":[\"crypto mining\",\"cryptocurrency mining\",\"google\",\"google cloud\",\"hack\",\"hackers\"],\"articleSection\":[\"Cryptocurrency Market News\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2021\",\"copyrightHolder\":{\"@id\":\"https:\/\/uniquehot.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/\",\"url\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/\",\"name\":\"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto\",\"isPartOf\":{\"@id\":\"https:\/\/uniquehot.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667\",\"datePublished\":\"2021-11-28T18:00:51+00:00\",\"dateModified\":\"2024-06-11T11:47:00+00:00\",\"description\":\"Attackers are exploiting poorly configured cloud accounts to mine crypto, Google warned users in a recent report. Cryptocurrency mining is a\",\"breadcrumb\":{\"@id\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#primaryimage\",\"url\":\"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667\",\"contentUrl\":\"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667\",\"width\":1000,\"height\":667,\"caption\":\"Google cloud crypto hack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/uniquehot.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/uniquehot.com\/#website\",\"url\":\"https:\/\/uniquehot.com\/\",\"name\":\"NewsBTC\",\"description\":\"Bitcoin & Cryptocurrency News Today\",\"publisher\":{\"@id\":\"https:\/\/uniquehot.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/uniquehot.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/uniquehot.com\/#organization\",\"name\":\"NewsBTC\",\"url\":\"https:\/\/uniquehot.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/uniquehot.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/uniquehot.com\/wp-content\/uploads\/2020\/06\/logo-min.png?fit=157%2C46\",\"contentUrl\":\"https:\/\/uniquehot.com\/wp-content\/uploads\/2020\/06\/logo-min.png?fit=157%2C46\",\"width\":157,\"height\":46,\"caption\":\"NewsBTC\"},\"image\":{\"@id\":\"https:\/\/uniquehot.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/newsbtc\",\"https:\/\/x.com\/newsbtc\",\"https:\/\/www.youtube.com\/channel\/UC9v9erBEru5y4c3FA0wehEw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/uniquehot.com\/#\/schema\/person\/89f403550fffa9b0c99099c7c141d886\",\"name\":\"Tolu Okuwoga\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/uniquehot.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c9200202f8f2da6f334c27793c9b2a6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c9200202f8f2da6f334c27793c9b2a6e?s=96&d=mm&r=g\",\"caption\":\"Tolu Okuwoga\"},\"url\":\"https:\/\/uniquehot.com\/author\/okuwogatoluwalase\/\"}]}<\/script>\n","yoast_head_json":{"title":"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto","description":"Attackers are exploiting poorly configured cloud accounts to mine crypto, Google warned users in a recent report. Cryptocurrency mining is a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto","og_description":"Attackers are exploiting poorly configured cloud accounts to mine crypto, Google warned users in a recent report. Cryptocurrency mining is a","og_url":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/","og_site_name":"NewsBTC","article_publisher":"https:\/\/www.facebook.com\/newsbtc","article_published_time":"2021-11-28T18:00:51+00:00","article_modified_time":"2024-06-11T11:47:00+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667","type":"image\/jpeg"}],"author":"Tolu Okuwoga","twitter_card":"summary_large_image","twitter_creator":"@newsbtc","twitter_site":"@newsbtc","twitter_misc":{"Written by":"Tolu Okuwoga","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#article","isPartOf":{"@id":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/"},"author":{"name":"Tolu Okuwoga","@id":"https:\/\/uniquehot.com\/#\/schema\/person\/89f403550fffa9b0c99099c7c141d886"},"headline":"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto","datePublished":"2021-11-28T18:00:51+00:00","dateModified":"2024-06-11T11:47:00+00:00","mainEntityOfPage":{"@id":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/"},"wordCount":512,"publisher":{"@id":"https:\/\/uniquehot.com\/#organization"},"image":{"@id":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#primaryimage"},"thumbnailUrl":"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667","keywords":["crypto mining","cryptocurrency mining","google","google cloud","hack","hackers"],"articleSection":["Cryptocurrency Market News"],"inLanguage":"en-US","copyrightYear":"2021","copyrightHolder":{"@id":"https:\/\/uniquehot.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/","url":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/","name":"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto","isPartOf":{"@id":"https:\/\/uniquehot.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#primaryimage"},"image":{"@id":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#primaryimage"},"thumbnailUrl":"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667","datePublished":"2021-11-28T18:00:51+00:00","dateModified":"2024-06-11T11:47:00+00:00","description":"Attackers are exploiting poorly configured cloud accounts to mine crypto, Google warned users in a recent report. Cryptocurrency mining is a","breadcrumb":{"@id":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#primaryimage","url":"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667","contentUrl":"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667","width":1000,"height":667,"caption":"Google cloud crypto hack"},{"@type":"BreadcrumbList","@id":"https:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uniquehot.com\/"},{"@type":"ListItem","position":2,"name":"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto"}]},{"@type":"WebSite","@id":"https:\/\/uniquehot.com\/#website","url":"https:\/\/uniquehot.com\/","name":"NewsBTC","description":"Bitcoin & Cryptocurrency News Today","publisher":{"@id":"https:\/\/uniquehot.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uniquehot.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uniquehot.com\/#organization","name":"NewsBTC","url":"https:\/\/uniquehot.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uniquehot.com\/#\/schema\/logo\/image\/","url":"https:\/\/uniquehot.com\/wp-content\/uploads\/2020\/06\/logo-min.png?fit=157%2C46","contentUrl":"https:\/\/uniquehot.com\/wp-content\/uploads\/2020\/06\/logo-min.png?fit=157%2C46","width":157,"height":46,"caption":"NewsBTC"},"image":{"@id":"https:\/\/uniquehot.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/newsbtc","https:\/\/x.com\/newsbtc","https:\/\/www.youtube.com\/channel\/UC9v9erBEru5y4c3FA0wehEw"]},{"@type":"Person","@id":"https:\/\/uniquehot.com\/#\/schema\/person\/89f403550fffa9b0c99099c7c141d886","name":"Tolu Okuwoga","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uniquehot.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c9200202f8f2da6f334c27793c9b2a6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c9200202f8f2da6f334c27793c9b2a6e?s=96&d=mm&r=g","caption":"Tolu Okuwoga"},"url":"https:\/\/uniquehot.com\/author\/okuwogatoluwalase\/"}]}},"parsely":{"version":"1.1.0","meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto","url":"http:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/uniquehot.com\/news\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\/"},"thumbnailUrl":"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?resize=200%2C200","image":{"@type":"ImageObject","url":"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667"},"articleSection":"Cryptocurrency Market News","author":[{"@type":"Person","name":"Tolu Okuwoga"}],"creator":["Tolu Okuwoga"],"publisher":{"@type":"Organization","name":"NewsBTC","logo":"https:\/\/uniquehot.com\/wp-content\/uploads\/2020\/06\/cropped-cropped-cropped-favicon.png?w=32"},"keywords":["crypto mining","cryptocurrency mining","google","google cloud","hack","hackers"],"dateCreated":"2021-11-28T18:00:51Z","datePublished":"2021-11-28T18:00:51Z","dateModified":"2024-06-11T11:47:00Z"},"rendered":"<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"Hackers Are Now Using Compromised Cloud Accounts To Mine Crypto\",\"url\":\"http:\\\/\\\/uniquehot.com\\\/news\\\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/uniquehot.com\\\/news\\\/hackers-are-now-using-compromised-cloud-accounts-to-mine-crypto\\\/\"},\"thumbnailUrl\":\"https:\\\/\\\/uniquehot.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/google-cloud-eos.jpg?resize=200%2C200\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/uniquehot.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/google-cloud-eos.jpg?fit=1000%2C667\"},\"articleSection\":\"Cryptocurrency Market News\",\"author\":[{\"@type\":\"Person\",\"name\":\"Tolu Okuwoga\"}],\"creator\":[\"Tolu Okuwoga\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"NewsBTC\",\"logo\":\"https:\\\/\\\/uniquehot.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/cropped-cropped-cropped-favicon.png?w=32\"},\"keywords\":[\"crypto mining\",\"cryptocurrency mining\",\"google\",\"google cloud\",\"hack\",\"hackers\"],\"dateCreated\":\"2021-11-28T18:00:51Z\",\"datePublished\":\"2021-11-28T18:00:51Z\",\"dateModified\":\"2024-06-11T11:47:00Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/uniquehot.com\/p.js"},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/uniquehot.com\/wp-content\/uploads\/2021\/11\/google-cloud-eos.jpg?fit=1000%2C667","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/uniquehot.com\/wp-json\/wp\/v2\/posts\/477547"}],"collection":[{"href":"https:\/\/uniquehot.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uniquehot.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uniquehot.com\/wp-json\/wp\/v2\/users\/545"}],"replies":[{"embeddable":true,"href":"https:\/\/uniquehot.com\/wp-json\/wp\/v2\/comments?post=477547"}],"version-history":[{"count":0,"href":"https:\/\/uniquehot.com\/wp-json\/wp\/v2\/posts\/477547\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uniquehot.com\/wp-json\/wp\/v2\/media\/477549"}],"wp:attachment":[{"href":"https:\/\/uniquehot.com\/wp-json\/wp\/v2\/media?parent=477547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uniquehot.com\/wp-json\/wp\/v2\/categories?post=477547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uniquehot.com\/wp-json\/wp\/v2\/tags?post=477547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}