Google Cloud can now detect cryptomining malware planted in virtual machines

A white padlock on a dark digital background.
(Image credit: Shutterstock.com)

To keep its virtual machines (VM) safe from cryptominers, Google has launched a new platform aimed at stopping malware for good.

The new Virtual Machine Threat Detection (VMTD) tool is available for Google Cloud’s Security Command Center Premium customers, and will work without additional software, meaning there won’t be any significant impact on the performance of the virtual machines, or operational burden for agent deployment and management.

As a result, there is less attack surface, and instead of using an agent, the threat detection adds “nearly universal and hard-to-tamper-with threat detection” to the hypervisor. 

Mining anonymous cryptos 

Cryptominers are a unique type of malware which, instead of trying to destroy the machine, steal sensitive data, or assimilate the device into a botnet, take advantage of the computing power to generate cryptocurrencies for the attacker.

Some blockchain networks operate on a mechanism called Proof of Work, in which computers that make up the network do heavy computing, and are rewarded in the network’s token. The process is also known as mining. 

The devices that “mine” cryptocurrencies are usually incapable of doing anything else, as mining takes up most of the devices’ compute power. 

Some malicious actors started distributing cryptomining malware which forces the victim’s device into mining, and sends all the earnings to the attackers. Usually, cryptominers mine the Monero token, as it’s believed to be a hard one to trace.

Besides rendering the computer almost useless, there is an extra risk with cryptominers on virtual machines - compute cost. 

An earlier report from Google Cloud (published late last year) claims that almost nine in ten (86%) of machines on the public cloud that are infected with malware, carry cryptominers.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
A hand reaching out to touch a futuristic rendering of an AI processor.
Google Cloud unveils new AI Protection security tools, no matter which model you use
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Mac users targeted with new malware, so be on your guard
A hand reaching out to touch a futuristic rendering of an AI processor.
Google says Gemini is being misused to launch major cyberattacks
A display showing off the Google TV homepage, with icons for 1917, Scoob!, YouTube and Twitch (among others)
This dangerous malware botnet now covers 1.6 million Android TVs - find out if you're at risk
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
A Lego Pikachu tail next to a Pebble OS watch and a screenshot of Assassin's Creed Shadow
ICYMI: the week's 7 biggest tech stories from LG's excellent new OLED TV to our Assassin's Creed Shadow review
Samuel and Romy standing very close together in A24's Babygirl movie
Everything new on Max in April 2025, including A24's Babygirl and The Last of Us season 2
An AMD Radeon RX 9070 XT made by Sapphire on a table with its retail packaging
AMD’s secret weapon against Nvidia seems to be stock – way more RX 9070 GPUs are rumored to be hitting shelves than RTX 5000 models
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks