Hackers Using Compromised Google Cloud Accounts to Mine Cryptocurrency
Threat actors are exploiting unsecured GCP instances to download cryptominers as well as abusing the cloud infrastructure to install ransomware, stage phishing campaigns, and more.