Skip to content

New attack technique: Encrypt GCS Objects Client-Side (gcp.impact.ransomware-gcs-client-side-encryption)#805

Open
Minosity-VR wants to merge 3 commits intosimon.marechal/gcp-impact-ransomware-gcs-batch-deletionfrom
simon.marechal/gcp-impact-ransomware-gcs-client-side-encryption
Open

New attack technique: Encrypt GCS Objects Client-Side (gcp.impact.ransomware-gcs-client-side-encryption)#805
Minosity-VR wants to merge 3 commits intosimon.marechal/gcp-impact-ransomware-gcs-batch-deletionfrom
simon.marechal/gcp-impact-ransomware-gcs-client-side-encryption

Conversation

@Minosity-VR
Copy link
Copy Markdown
Collaborator

What does this PR do?

Adds a new GCP attack technique gcp.impact.ransomware-gcs-client-side-encryption that simulates a sophisticated ransomware attack by downloading GCS objects, encrypting them with AES-256-GCM client-side, re-uploading as .enc files, and deleting the originals.

Motivation

GCP parity effort with existing AWS techniques (analogous to aws.impact.s3-ransomware-client-side-encryption).

Checklist

  • The attack technique emulates a single attack step, not a full attack chain
  • We have factual evidence & references that the attack technique was used by real malware, pentesters, or attackers
  • The attack technique makes no assumption about the state of the environment prior to warming it up

Test results

  • Technique detonates successfully
  • Detection log identified (storage.objects.create + storage.objects.delete) — there is no audit log emitted for GCS object operations without non-default Data Access audit log configuration; volume-based detection would likely yield too many false positives given typical GCS usage at scale

@Minosity-VR Minosity-VR force-pushed the simon.marechal/gcp-impact-ransomware-gcs-batch-deletion branch from 1abe77e to 24d6c78 Compare March 30, 2026 14:54
@Minosity-VR Minosity-VR force-pushed the simon.marechal/gcp-impact-ransomware-gcs-client-side-encryption branch from 36c8921 to 2e6d697 Compare March 30, 2026 14:54
@Minosity-VR Minosity-VR marked this pull request as ready for review April 1, 2026 07:25
@Minosity-VR Minosity-VR requested review from a team as code owners April 1, 2026 07:25
@Minosity-VR Minosity-VR force-pushed the simon.marechal/gcp-impact-ransomware-gcs-batch-deletion branch from 24d6c78 to cef4be3 Compare April 1, 2026 08:29
@Minosity-VR Minosity-VR force-pushed the simon.marechal/gcp-impact-ransomware-gcs-client-side-encryption branch from 2e6d697 to 87a6a97 Compare April 1, 2026 08:29
@Minosity-VR Minosity-VR force-pushed the simon.marechal/gcp-impact-ransomware-gcs-batch-deletion branch from cef4be3 to 643d9d7 Compare April 1, 2026 08:53
@Minosity-VR Minosity-VR force-pushed the simon.marechal/gcp-impact-ransomware-gcs-client-side-encryption branch from 87a6a97 to 0c54019 Compare April 1, 2026 08:53
@Minosity-VR Minosity-VR force-pushed the simon.marechal/gcp-impact-ransomware-gcs-batch-deletion branch from 643d9d7 to ebeb6e5 Compare April 1, 2026 09:04
@Minosity-VR Minosity-VR force-pushed the simon.marechal/gcp-impact-ransomware-gcs-client-side-encryption branch from 0c54019 to 4c01186 Compare April 1, 2026 09:04
Minosity-VR and others added 3 commits April 9, 2026 10:18
…somware-gcs-client-side-encryption)

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@Minosity-VR Minosity-VR force-pushed the simon.marechal/gcp-impact-ransomware-gcs-client-side-encryption branch from 4c01186 to 7b51e0c Compare April 9, 2026 08:28
@Minosity-VR Minosity-VR force-pushed the simon.marechal/gcp-impact-ransomware-gcs-batch-deletion branch from ebeb6e5 to 18e15e7 Compare April 9, 2026 08:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant