Thursday, 29 Jan 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > Google Cloud targeted by PINEAPPLE and FLUXROOT for phishing attacks
Cloud Computing

Google Cloud targeted by PINEAPPLE and FLUXROOT for phishing attacks

Last updated: July 26, 2024 2:33 pm
Published July 26, 2024
Share
Google Cloud targeted by PINEAPPLE and FLUXROOT for phishing attacks
SHARE

Google Cloud serverless initiatives are being utilized by a Latin American financially motivated risk group, codenamed FLUXROOT, to orchestrate credential phishing campaigns, the The Hacker News has reported.

This occasion shouldn’t be remoted, as quite a few malefactors in our on-line world are exploiting cloud computing providers for malicious targets. Thus, IT and cybersecurity professionals are dealing with a urgent problem within the cybersecurity panorama.

Google’s biannual Menace Horizons Report examines the growth of serverless structure and affords recommendation on what it is advisable to know. Because the report notes, the identical points of serverless expertise that make it helpful to professional enterprises – its flexibility, low price, and ease – have attracted cybercriminals. Particularly, risk actors have been turning to this infrastructure as a service to proliferate malware, retailer and serve phishing pages, and run serverless-compatible scripts.

Relating to FLUXROOT, the group used Google Cloud container URLs to host subtle credential phishing pages. Their goal was Mercado Pago, a extremely standard on-line funds platform used all through the Latin American area. The group’s effort relied on impersonating the platform’s login interface to reap customers’ login credentials, with the target of securing unauthorised entry to the victims’ monetary accounts.

It’s value noting that FLUXROOT’s work shouldn’t be restricted to this explicit marketing campaign. The group can be recognized for distributing the information-stealing Grandoreiro banking trojan, a classy malware focusing on monetary operations. Not too long ago, it has been discovered that FLUXROOT’s techniques have modified, and it now makes use of different professional cloud providers to distribute the malware, together with Microsoft Azure and Dropbox. Thus, their techniques have been profitable, and cloud providers have change into one other manner for the group to conduct their “enterprise.”

See also  Google Commits $2 Billion to Establish Data Center and Cloud Hub in Malaysia

However FLUXROOT isn’t the one risk actor exploiting Google’s cloud infrastructure. One other adversary, recognized as PINEAPPLE, has been noticed utilizing Google Cloud to propagate a special pressure of malware often known as Astaroth (additionally known as Guildma). This stealer malware primarily targets Brazilian customers, highlighting the regional focus of a few of these assaults.

PINEAPPLE’s methodology concerned each compromising present Google Cloud cases and creating their very own initiatives. They used these sources to generate container URLs on professional Google Cloud serverless domains, reminiscent of cloudfunctions[.]internet and run.app. These URLs hosted touchdown pages that may then redirect unsuspecting targets to malicious infrastructure, ensuing within the deployment of the Astaroth malware.

Moreover, PINEAPPLE demonstrated high-level evasion strategies. As an illustration, they used mail forwarding providers that don’t drop messages with a failing Sender Coverage Framework (SPF). In addition they integrated knowledge that was surprising within the unique code and sometimes within the SMTP Return-Path area, which might set off time-outs in DNS requests. The addition of this knowledge would additionally hinder e mail authentication assessments by failing SPF checks. These strategies are very superior and point out the speed at which cyber capabilities are rising.

In response to those threats, Google has taken decisive motion. The tech big has shut down the recognized malicious Google Cloud initiatives and up to date its Protected Shopping lists to guard customers. Nonetheless, the incident highlights the continuing cat-and-mouse recreation between cybersecurity defenders and risk actors within the cloud house.

The weaponisation of cloud providers and infrastructure by cybercriminals shouldn’t be restricted to phishing and malware distribution. Different malicious actions, reminiscent of illicit cryptocurrency mining exploiting weak configurations and ransomware assaults, have additionally seen a surge in cloud environments. This pattern is basically pushed by the widespread adoption of cloud applied sciences throughout varied industries.

See also  Montage Technology launches Memory eXpander Controller

One of the vital challenges posed by this shift is the elevated issue in detecting malicious actions. By leveraging professional cloud providers, risk actors can extra simply mix their operations into regular community visitors, making it more durable for safety groups to differentiate between professional and malicious actions.

Regardless of the case, with the present tempo of cloud adoption – no matter whether or not the vector is uncontrolled or not – it’s evident that each the cloud suppliers and their customers ought to stay on guard. Common safety audits, strong technique of authentication, and cutting-edge techniques of risk detection are quickly turning into conditions for any safe cloud atmosphere. The assaults of tomorrow are by no means going to be the identical because the assaults of yesterday, and neither ought to our instruments towards them.

See additionally: Alphabet surpasses Q2 income and revenue expectations amid strong advert demand

Need to study extra about cybersecurity and the cloud from business leaders? Try Cyber Security & Cloud Expo going down in Amsterdam, California, and London. Discover different upcoming enterprise expertise occasions and webinars powered by TechForge here.

Tags: cloud, cybersecurity, google cloud, Safety

Source link

TAGGED: Attacks, cloud, FLUXROOT, Google, phishing, PINEAPPLE, Targeted
Share This Article
Twitter Email Copy Link Print
Previous Article SITE completes upgrade for Isle of Wight NHS Trust SITE completes upgrade for Isle of Wight NHS Trust
Next Article HEPHAISTOS-Pharma Raises €2M in Seed Funding Confo Therapeutics Raises EUR 60M in Series B Financing
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Novel 3D nanofabrication techniques enable miniaturized robots

Two variations of the robotic at totally different dimension scales are positioned subsequent to a…

November 14, 2025

Red Team AI now to build safer, smarter models tomorrow

Be part of the occasion trusted by enterprise leaders for practically twenty years. VB Rework…

June 16, 2025

What Goes Into a Strong Cybersecurity Culture? | DCN

IT leaders widely acknowledge that a strong cybersecurity culture is essential for maintaining an organization’s…

February 8, 2024

Telehouse champions digital inclusion with laptop donation to local LBTH charitable organisations

The donation, made potential by the LBTH council’s Social Worth Advantages Scheme, enhances the digital…

March 13, 2024

ZincFive targets AI data centers with new energy system

The system is engineered to soak up sharp transient masses from GPU clusters and AI…

November 9, 2025

You Might Also Like

Is 2026 the year cloud customers take back control?
Global Market

Is 2026 the year cloud customers take back control?

By saad
How Mercedes F1 uses cloud for real-time decision-making
Cloud Computing

How Mercedes F1 uses cloud for real-time decision-making

By saad
Screenshot of Formula E data insights being driven by Google Cloud Gemini AI as the partners expand their work to sustain net zero targets by driving efficiency across its global logistics and commercial operations.
AI

How Formula E uses Google Cloud AI to meet net zero targets

By saad
Railway secures $100 million to challenge AWS with AI-native cloud infrastructure
AI

Railway secures $100 million to challenge AWS with AI-native cloud infrastructure

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.