This document describes a threat finding type in Security Command Center. Threat findings are generated by threat detectors when they detect a potential threat in your cloud resources. For a full list of available threat findings, see Threat findings index.
Overview
A successful login in a database instance occurred from a known anonymizing IP address. These anonymizing addresses are Tor nodes. This could indicate an attacker gaining initial access to your instance.
Event Threat Detection is the source of this finding.
How to respond
To respond to this finding, do the following:
Step 1: Review finding details
- Open an
Initial Access: CloudDB Successful login from Anonymizing Proxy IP
finding, as directed in Reviewing findings. On the Summary tab of the finding details panel, review the information in the following sections:
- What was detected, especially the following fields:
- Indicator IP address, the anonymizing ip address.
- Database display name: the name of the database in the Cloud SQL PostgreSQL, MySQL or AlloyDB instance that was affected.
- Database user name: the user.
- Project full name: the Google Cloud project that contains the Cloud SQL instance.
Step 2: Research attack and response methods
- Review the MITRE ATT&CK framework entry for this finding type: Initial Access.
- To determine if additional remediation steps are necessary, combine your investigation results with MITRE research.
Step 3: Implement your response
The following response plan might be appropriate for this finding, but might also impact operations. Carefully evaluate the information you gather in your investigation to determine the best way to resolve findings.
Review the users allowed to connect to the database.
- For PostgreSQL, see Create and manage users
- For MySQL, see Manage users with built-in authentication
Consider changing the password for the user.
- For PostgreSQL, see Set the password for the default user
For MySQL, see Set the password for the default user
Update the credentials for the clients that connect to the Cloud SQL instance
What's next
- Learn how to work with threat findings in Security Command Center.
- Refer to the Threat findings index.
- Learn how to review a finding through the Google Cloud console.
- Learn about the services that generate threat findings.