Name:GCP Detect gcploit framework id:a1c5a85e-a162-410c-a5d9-99ff639e5a52 version:3 date:2024-10-17 author:Rod Soto, Splunk status:experimental type:TTP Description:The following analytic identifies the use of the GCPloit exploitation framework within Google Cloud Platform (GCP). It detects specific GCP Pub/Sub messages with a function timeout of 539 seconds, which is indicative of GCPloit activity. This detection is significant as GCPloit can be used to escalate privileges and facilitate lateral movement from compromised high-privilege accounts. If confirmed malicious, this activity could allow attackers to gain unauthorized access, escalate their privileges, and move laterally within the GCP environment, potentially compromising sensitive data and critical resources. Data_source: