Initial Access: CloudDB Successful login from Anonymizing Proxy IP

This document describes a threat finding type in Security Command Center. Threat findings are generated by threat detectors when they detect a potential threat in your cloud resources. For a full list of available threat findings, see Threat findings index.

Overview

A successful login in a database instance occurred from a known anonymizing IP address. These anonymizing addresses are Tor nodes. This could indicate an attacker gaining initial access to your instance.

How to respond

To respond to this finding, do the following:

Step 1: Review finding details

  1. Open an Initial Access: CloudDB Successful login from Anonymizing Proxy IP finding, as directed in Reviewing findings.
  2. On the Summary tab of the finding details panel, review the information in the following sections:

    • What was detected, especially the following fields:
    • Indicator IP address, the anonymizing ip address.
    • Database display name: the name of the database in the Cloud SQL PostgreSQL, MySQL or AlloyDB instance that was affected.
    • Database user name: the user.
    • Project full name: the Google Cloud project that contains the Cloud SQL instance.

Step 2: Research attack and response methods

  1. Review the MITRE ATT&CK framework entry for this finding type: Initial Access.
  2. To determine if additional remediation steps are necessary, combine your investigation results with MITRE research.

Step 3: Implement your response

The following response plan might be appropriate for this finding, but might also impact operations. Carefully evaluate the information you gather in your investigation to determine the best way to resolve findings.

What's next