Schließen
Schließen
Ihr Netzwerk von morgen
Ihr Netzwerk von morgen
Planen Sie Ihren Weg zu einem schnelleren, sichereren und widerstandsfähigeren Netzwerk, das auf die von Ihnen unterstützten Anwendungen und Benutzer zugeschnitten ist.
          Erleben Sie Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            Ein führendes Unternehmen im Bereich SSE. Jetzt ein führender Anbieter von SASE.
            Ein führendes Unternehmen im Bereich SSE. Jetzt ein führender Anbieter von SASE.
            Netskope debütiert als Leader im Gartner ® Magic Quadrant ™ für Single-Vendor SASE
              Generative KI für Dummies sichern
              Generative KI für Dummies sichern
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Moderne Data Loss Prevention (DLP) für Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modernes SD-WAN für SASE Dummies-Buch
                  Modern SD-WAN for SASE Dummies
                  Hören Sie auf, mit Ihrer Netzwerkarchitektur Schritt zu halten
                    Verstehen, wo die Risiken liegen
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Die 6 überzeugendsten Anwendungsfälle für den vollständigen Ersatz älterer VPNs
                        Die 6 überzeugendsten Anwendungsfälle für den vollständigen Ersatz älterer VPNs
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive schützt sein "geistiges Eigentum" mit intelligentem und anpassungsfähigem Datenschutz
                          Colgate-Palmolive schützt sein "geistiges Eigentum" mit intelligentem und anpassungsfähigem Datenschutz
                            Netskope GovCloud
                            Netskope erhält die FedRAMP High Authorization
                            Wählen Sie Netskope GovCloud, um die Transformation Ihrer Agentur zu beschleunigen.
                              Let's Do Great Things Together
                              Die partnerorientierte Markteinführungsstrategie von Netskope ermöglicht es unseren Partnern, ihr Wachstum und ihre Rentabilität zu maximieren und gleichzeitig die Unternehmenssicherheit an neue Anforderungen anzupassen.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Technischer Support von Netskope
                                  Technischer Support von Netskope
                                  Überall auf der Welt sorgen unsere qualifizierten Support-Ingenieure mit verschiedensten Erfahrungen in den Bereichen Cloud-Sicherheit, Netzwerke, Virtualisierung, Content Delivery und Software-Entwicklung für zeitnahen und qualitativ hochwertigen technischen Support.
                                    Netskope-Video
                                    Netskope-Schulung
                                    Netskope-Schulungen helfen Ihnen, ein Experte für Cloud-Sicherheit zu werden. Wir sind hier, um Ihnen zu helfen, Ihre digitale Transformation abzusichern und das Beste aus Ihrer Cloud, dem Web und Ihren privaten Anwendungen zu machen.

                                      Cloud Threats Memo: Multiple Different Cloud Apps Abused in a Single Cyber Espionage Campaign

                                      Mar 03 2023

                                      Threat actors continue to exploit cloud services for cyber espionage, and a new campaign by a threat cluster named WIP26, discovered recently by researchers at Sentinel One in collaboration with QGroup, targeting telecommunication providers in the Middle East, confirms this trend. 

                                      In particular what makes this campaign stand out is the abuse of multiple cloud services in different stages of the kill chain in an attempt to evade detection by making malicious traffic look legitimate, making life harder for defenders. Dropbox and Microsoft Azure are exploited to host and distribute the malware payload (Microsoft Azure is also abused to exfiltrate data), whereas the command and control infrastructure relies on two additional cloud services, Microsoft 365 Mail and Google Firebase. In practice, the campaign is based exclusively on the weaponization of legitimate cloud services. Personally this is the first time I’ve seen four different cloud services exploited in the same campaign.

                                      The initial attack vector involves the delivery of targeted WhatsApp messages containing Dropbox links to archive files that supposedly contain documents on poverty issues in the Middle East, as well as a malware loader masquerading as the PDFelement application. There are two elements in this modus operandi that are normally leveraged by threat actors: it’s easier to trick the victims by delivering the malicious links on a mobile device, and, despite all the warnings, users tend to install applications from any origin, without checking the legitimacy.

                                      The malware loader deploys a backdoor called CMD365, which executes commands from a Microsoft 365 Mail instance using the Microsoft Graph API (a technique used in several cyber espionage campaigns) and exfiltrates data to a Microsoft Azure instance. Among the malware deployed on compromised machines, there is also an additional sample called CMDEmber, which uses Google Firebase as the command and control server.

                                      How Netskope mitigates the risk of legitimate cloud services exploited to deliver malware

                                      Dropbox, Microsoft Azure, Microsoft Office 365 Suite (where Microsoft 365 Mail belongs), and Google Firebase are among the thousands of services where the Netskope Next Gen SWG can provide granular access control, threat protection, and DLP capabilities. Dropbox and the Microsoft applications are also among the hundreds of services for which instance detection is available.

                                      In those cases, where a cloud service is exploited to host the command and control, it is possible to configure a policy that prevents potentially dangerous activities (such as upload and download) for unmanaged cloud services or non-corporate instances of managed cloud services.

                                      To defend against attacks where a legitimate cloud service is exploited to distribute malware, it is possible to configure a policy that prevents potentially dangerous activities (such as download) from non-corporate instances, or in general from any unneeded cloud storage service for the enterprise.

                                      Netskope customers are also protected against malware distributed from a legitimate cloud service and the web in general by Netskope Threat Protection. Netskope Threat Protection scans web and cloud traffic to detect known and unknown threats with a comprehensive set of engines, including signature-based AV, machine learning-based detectors for executables and Office documents, and sandboxing, including patient zero protection.

                                      Netskope Cloud Exchange provides powerful integration tools to leverage investments across their security posture through integration with third-party tools, such as threat intelligence feeds and endpoint detection technologies.

                                      Finally, Netskope Advanced Analytics provides specific dashboards to assess the risk of rogue cloud instances being exploited to deliver malware or becoming the target of anomalous communications, with rich details and insights, supporting security teams in the analysis and mitigation/remediation process.

                                      You can subscribe to the Cloud Threats Memo mailing list at this link.

                                      Stay safe!

                                      author image
                                      Paolo Passeri
                                      Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
                                      Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.

                                      Bleiben Sie informiert!

                                      Abonnieren Sie den Netskope-Blog