Google can detect cryptocurrency mining malware without needing to install software on the user's computer
Google has just announced a public beta of its Virtual Machine Threat Detection (VMTD) system. This new system can detect cryptocurrency miners and other malware without needing to install specialized scanning software on users' machines.
Currently, developers and businesses using cloud-based virtual machines are constantly being targeted by hackers. Cyber criminals have found ways to install virtual currency mining tools on victims' virtual machines. This causes the CPU and GPU performance of the virtual machine to be affected, reducing work productivity.
In its 2021 Threat Horizons report, Google said that cryptocurrency mining malware accounts for 86% of all cloud computing virtual machine attacks.
To detect threats on virtual machines, cloud computing service providers often install software running inside the server. This software will act as security software.
However, security software can affect performance, and when a server is compromised, hackers can disable it before deploying malicious code.
Therefore, Google engineers have found a unique approach that does not involve installing security software or remotely collecting data. Google has made changes to its Google Compute Engine hypervisor, the underlying simulation software that virtual machines run inside. The ability to scan and analyze virtual machine memory and network requests is added so that suspicious activities can be detected.
This approach from Google does not affect performance because there is no need to install additional software.
The VMTD feature is available for trial as early as February 8, 2022 and can be enabled from the Security Command Center. Google also shared an inactive cryptocurrency mining tool on GitHub that admins can use to check if they have correctly configured VMTD on their systems.
Google also guarantees that VMTD will not collect or track any user data.
You should read it
- Just because he wanted to hack the game, my brother was infected with cryptocurrency mining malware and ruined his laptop like this
- Amazon offers cryptocurrency mining in the cloud
- AMD Radeon RX 6600 XT - the next 'monster' in the world of crypto mining!
- 5 super fast ways to stop digging virtual money on web browser
- Norton antivirus adds Ethereum mining feature
- Detecting a new type of malware that steals Windows passwords, installs a virtual currency mining tool and continues to spread trojans
- The exchange crashed, turning many virtual currency investors into USD billionaires in a few hours
- ICP Just appeared 1 day, the infinity virtual currency is causing market fever
May be interested
- 5 super fast ways to stop digging virtual money on web browserwhen mining cryptocurrency becomes popular, website owners use cryptocurrency mining scripts to use the visitor's cpu power to make a profit. so this article will introduce you to some methods of preventing cryptocurrency exploitation in web browsers.
- Instructions for finding and deleting the original Keylogger from your computerkeyloggers are extremely dangerous programs that hackers install on any user's system for the purpose of stealing passwords, credit card information, etc. keyloggers store all keystrokes that users use. work on your computer and provide hackers with important user information.
- Detected 172 fake Android apps used to mine coinsas revealed by researchers from cybersecurity firm lookout, 172 fake android apps for cryptocurrency mining have been discovered, tricking at least 93,000 people.
- Mars Stealer - dangerous malware that silently steals cryptocurrencythe mars stealer malware is only 95kb in size, but the level of danger is alarming when it can attack a variety of targets such as popular browsers, cryptocurrency wallets and two-factor authentication.
- Hackers blackmail and force YouTuber to spread cryptocurrency mining malwareyoutube 'shaken' as youtubers are becoming easy prey for cybercriminals.
- What is Data Mining? Data Mining Is it legal?data mining is a concept that is gaining popularity, but not many people know what it is. many online companies have talked about how they use data mining to improve the quality of their services. but what is data mining? is it legal?
- Amazon offers cryptocurrency mining in the cloudthe virtual currency dubbed the 'green bitcoin' of china is now available for mining on the cloud computing platform amazon web services (aws).
- Extract music from Youtube without needing software on your computerextracting music from youtube is one of the methods of downloading mp3 music that many people apply today instead of downloading youtube videos. in addition to using current conversion software, users can also rip music from youtube without needing software on the computer extremely conveniently and quickly.
- How to use Malwarebytes Anti-Malware to scan and remove malwaremalwarebytes anti-malware is one of the leading antivirus and computer protection software available today. with the ability to detect and remove malware, trojans, ransomware, adware, and other security threats, malwarebytes helps keep your personal data safe.
- Chrome 17 blocks malware that helps usersnine months after the test, the new chrome version has a mechanism to prevent users from accidentally downloading malicious software (malware) - google announced.