Cloud Cover: How Malicious Actors Are Leveraging Cloud Services
Summary: Security Officer Comments: Link(s):
In the past year, there has been an increase in the number of threat actors leveraging legitimate cloud services in attacks. According to researchers at Symantec, trusted services like Microsoft OneDrive or Google Drive are frequently being abused given that traffic to and from such services is less likely to raise red flags than communications with attack-controlled infrastructure. Several different malware campaigns have been observed by Symantec leveraging these services, which have been highlighted below:
Taking a look at the above payloads, they all utilize Microsoft Graph, an API that is used to facilitate access to resources hosted on Microsoft cloud services, such as Microsoft 365, OneDrive, Outlook, and much more. This broad access to various services has sparked a keen interest among threat actors, as they can access a wide range of data and services such as email, calendar events, files, or devices, which can open the door for targeted phishing, lateral movement, and other malicious operations. Furthermore, communications with the Microsoft Graph API are encrypted, making it challenging for network monitoring tools to inspect the contents of the data being transmitted. Given that organizations frequently use services like Office 365 and OneDrive, traffic to and from the Graph API is less likely to raise suspicion, making detection all the more difficult.
Suggested Corrections:
Symantec recommends:
https://symantec-enterprise-blogs.security.com/threat-intelligence/cloud-espionage-attacks