Cloud computing has gained massive popularity in the last
decade. It is being used in different industry sectors, and
it has become essential to run a business. However, some
people still worry about security risks in cloud computing.
Well, nothing is perfect. Though cloud providers have been
hard at work to minimize these risks as much as possible.
The hackers are always going to keep trying, and from time
to time, they will succeed. According to
Proofpoint, an enterprise security firm, in 2019, they detected
around 15 million unauthorized login attempts for the US
Fortune 500 firms. Unfortunately, 400,000 of these attempts
were successful.
It should be considered that security breaches more usually
happen due to human error rather than a flaw in the system.
These human-errors can include weak passwords, phishing
attempts, and flawed configuration of the cloud.
In 2010, Microsoft faced a security breach in its Business
Productivity Online Suite due to a configuration issue. This
led to unauthorized access to the employee’s contact
information. Fortunately, the issue was fixed quickly and
did not affect a lot of users.
Dropbox also faced a similar issue in 2012. Though they were
not as lucky as Microsoft. Email addresses and passwords for
over 68 million users were leaked and sold on the dark web.
What was worse is that they only learned about the severity
of this breach four years later.
Other companies have also faced security breaches in the
cloud; however, most of them occurred in the first half of
the decade. Since then, the companies have tried their best
to tighten their security and prevent such incidents in the
future.
One of the greatest ways to earn money on cryptocurrencies is by mining coins , short: using computer processing power to gain coins and sell them anonymously. This is one reason hackers are trying to get people's cloud credentials and then to create hundreds of virtual machines that work for them and they can work for many hours before you’ll get any notification. This will generate tons of money for the hackers and you will get a huge bill for the computing power you’ve used on your account.
One of the ways hackers are getting in hands of your account credentials are through public versioning hosts such as Github. If you’re uploading your code together with your credentials, the chances are big that they’ll get scraped and used in the future by someone.s are made against peoples virtual machines to hijack peoples virtual machines to mine coins.