Schließen
Schließen
Ihr Netzwerk von morgen
Ihr Netzwerk von morgen
Planen Sie Ihren Weg zu einem schnelleren, sichereren und widerstandsfähigeren Netzwerk, das auf die von Ihnen unterstützten Anwendungen und Benutzer zugeschnitten ist.
          Erleben Sie Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            Ein führendes Unternehmen im Bereich SSE. Jetzt ein führender Anbieter von SASE.
            Ein führendes Unternehmen im Bereich SSE. Jetzt ein führender Anbieter von SASE.
            Netskope debütiert als Leader im Gartner ® Magic Quadrant ™ für Single-Vendor SASE
              Generative KI für Dummies sichern
              Generative KI für Dummies sichern
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Moderne Data Loss Prevention (DLP) für Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modernes SD-WAN für SASE Dummies-Buch
                  Modern SD-WAN for SASE Dummies
                  Hören Sie auf, mit Ihrer Netzwerkarchitektur Schritt zu halten
                    Verstehen, wo die Risiken liegen
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Die 6 überzeugendsten Anwendungsfälle für den vollständigen Ersatz älterer VPNs
                        Die 6 überzeugendsten Anwendungsfälle für den vollständigen Ersatz älterer VPNs
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive schützt sein "geistiges Eigentum" mit intelligentem und anpassungsfähigem Datenschutz
                          Colgate-Palmolive schützt sein "geistiges Eigentum" mit intelligentem und anpassungsfähigem Datenschutz
                            Netskope GovCloud
                            Netskope erhält die FedRAMP High Authorization
                            Wählen Sie Netskope GovCloud, um die Transformation Ihrer Agentur zu beschleunigen.
                              Let's Do Great Things Together
                              Die partnerorientierte Markteinführungsstrategie von Netskope ermöglicht es unseren Partnern, ihr Wachstum und ihre Rentabilität zu maximieren und gleichzeitig die Unternehmenssicherheit an neue Anforderungen anzupassen.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Technischer Support von Netskope
                                  Technischer Support von Netskope
                                  Überall auf der Welt sorgen unsere qualifizierten Support-Ingenieure mit verschiedensten Erfahrungen in den Bereichen Cloud-Sicherheit, Netzwerke, Virtualisierung, Content Delivery und Software-Entwicklung für zeitnahen und qualitativ hochwertigen technischen Support.
                                    Netskope-Video
                                    Netskope-Schulung
                                    Netskope-Schulungen helfen Ihnen, ein Experte für Cloud-Sicherheit zu werden. Wir sind hier, um Ihnen zu helfen, Ihre digitale Transformation abzusichern und das Beste aus Ihrer Cloud, dem Web und Ihren privaten Anwendungen zu machen.

                                      Cloud and Threat Report: Cloudy with a Chance of Malware

                                      Apr 28 2021

                                      Cybercriminals are increasingly abusing popular cloud apps to deliver malware to their victims. In 2020, more than half of all the malware downloads detected and blocked by the Netskope Security Cloud platform originated from cloud apps. Cloud apps are commonly abused to deliver Trojans, with attackers attempting to exploit the trust placed in the app used for delivery. Increasingly, cloud apps are also abused for next-stage downloads, with attackers attempting to blend in with benign traffic. This blog post analyzes how attackers are abusing popular cloud apps and what you can do to defend yourself.

                                      This blog post accompanies the release of the February 2021 Cloud and Threat Report, which analyzes 2020’s most interesting trends in enterprise cloud and web security. In addition to highlighting personal app usage, the Cloud and Threat Report also highlights four other trends:

                                      Cloud vs. Web: The Trend

                                      For each malware download, we determine whether the download originated from a cloud app or from the web based on its URL. If the URL matches one of the cloud apps signatures in our CCI database, then it is a “cloud app” download. Otherwise, it is a “web” download. For example, a file downloaded from somerandomwebsite[.]com/malware.exe does not match any of the signatures in our CCI database and is labeled a “web” download. A file downloaded from drive.google[.]com/file/d/abcd1234 matches the Google Drive signature in our CCI database and is labeled a “cloud” download.

                                      The following chart shows that the percentage of malware downloads from cloud apps has increased 14 points from 48% in Q1 2020 to 62% in Q1 2021. At the beginning of 2020, the majority of malware downloads came from the web. Starting in Q2 2020, the majority of malware downloads came from cloud apps, and that percentage continues to grow quarter-over-quarter.

                                      Chart showing the percentage of malware downloads from cloud apps

                                      Breakdown by app

                                      Which cloud apps are the malware downloads detected on the Netskope Security Cloud platform coming from? In general, cybercriminals abuse popular apps to host malware. By selecting popular cloud apps, they aim to bypass blocklists that might block traditional malware delivery infrastructure. They also aim to exploit trust that users place in these popular apps. In other words, cybercriminals go wherever the users are. While the Netskope Security Cloud detected malware downloads from 166 distinct cloud apps in the past 18 months, the downloads were heavily concentrated in the most popular apps. The most popular webmail and cloud storage apps accounted for 70% of the total malware downloads:

                                      • Amazon S3
                                      • Box
                                      • GitHub
                                      • Google Drive
                                      • Google Gmail
                                      • Microsoft OneDrive
                                      • Microsoft Outlook.com
                                      • Sourceforge

                                      While cloud apps are most commonly used for initial Trojan downloads, cybercriminals have also used them to host next-stage downloads. The GuLoader Trojan downloader was used by multiple threat actors in the past 18 months to download next-stage payloads from Google Drive and Microsoft OneDrive. GuLoader was the most common source of next-stage payloads in the cloud on the Netskope Security Cloud platform in 2020.

                                      Breakdown by file type

                                      The distribution of the types of files differs between cloud apps and the web. From the web, the majority of malware downloads are of Windows Portable Executable (PE) files, like EXEs and DLLs. The other half are archive files, like Zip files, Microsoft Office file formats, and other types, like scripts and JARs.

                                      Pie chart showing breakdown of web malware by file type

                                      By comparison, malware files downloaded from cloud apps are more evenly distributed among these four file types, with PE files representing only one-quarter of all downloads and Office files notably representing 15.9% (compared to 4.5% for web malware downloads). In other words, the surge in malicious Office documents we observed in 2020 was driven primarily by malicious Office documents downloaded from cloud apps.

                                      Pie chart showing breakdown of cloud malware by file type

                                      Data analysis

                                      The analysis presented in this blog post is based on anonymized usage data collected by the Netskope Security Cloud platform relating to a subset of Netskope customers with prior authorization.

                                      Conclusion

                                      The rise in the popularity of cloud apps as a channel for cybercriminals to deliver malware is a result of the overall rise in popularity of cloud apps—cybercriminals go wherever their victims are. Because nearly any cloud app can be abused as a malware distribution channel, organizations should enact policies to scan all content entering their networks—from the web or from the cloud—for malware.

                                      author image
                                      Ray Canzanese
                                      Ray is the Director of Netskope Threat Labs, which specializes in cloud-focused threat research. His background is in software anti-tamper, malware detection and classification, cloud security, sequential detection, and machine learning.
                                      Ray is the Director of Netskope Threat Labs, which specializes in cloud-focused threat research. His background is in software anti-tamper, malware detection and classification, cloud security, sequential detection, and machine learning.

                                      Bleiben Sie informiert!

                                      Abonnieren Sie den Netskope-Blog