The report said the actors usually gained access to Cloud accounts 
because of “poor customer security practices” or “vulnerable third-party
 software.”
In a report aimed at assessing threats to Cloud users, Google’s 
Cybersecurity Action Team said that some attackers are exploiting 
“poorly configured” accounts to mine cryptocurrency.
On Wednesday, the Google team said
 out of 50 analyzed incidents that compromised the Google Cloud 
Protocol, 86% were related to crypto mining. The hackers used the 
compromised Cloud accounts to access resources from individuals’ CPUs or
 GPUs to mine tokens or take advantage of storage space when mining coins on the Chia Network. 
However,
 Google’s team reported that many of the attacks were not limited to a 
single malicious action like crypto mining, but also as a staging point 
to conduct other hacks and identify other vulnerable systems. According 
to the cybersecurity team, the actors usually gained access to Cloud 
accounts as a result of “poor customer security practices” or 
“vulnerable third-party software.”
“While data theft did not 
appear to be the objective of these compromises, it remains a risk 
associated with the cloud asset compromises as bad actors start 
performing multiple forms of abuse,” said the Cybersecurity Action Team.
 “The public Internet-facing Cloud instances were open to scanning and 
brute force attacks.”
The speed of the attacks was also 
noteworthy. According to Google’s analysis, hackers were able to 
download crypto mining software to the compromised accounts within 22 
seconds in the majority of the incidents analyzed. Google suggested that
 “the initial attacks and subsequent downloads were scripted events not 
requiring human intervention” and said it would be nearly impossible to 
manually intervene to stop such incidents once they started.
An
 attack on multiple users’ Cloud accounts to gain access to additional 
computing power is not a new approach to illicitly mining crypto. 
‘Cryptojacking’, as it is known by many in the space, has had several 
high-profile incidents including a hack of Capital One in 2019 to allegedly use credit card users’ servers to mine crypto. However, browser-based cryptojacking as well as mining crypto after gaining access through deceptive app downloads is also still a problem for many users.