• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers discover severe security flaws in major e2ee cloud storage

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

You are here: Home / General Cyber Security News / Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers
October 21, 2024

Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that could be exploited to leak sensitive data.

“The vulnerabilities range in severity: in many cases a malicious server can inject files, tamper with file data, and even gain direct access to plaintext,” ETH Zurich researchers Jonas Hofmann and Kien Tuong Truong said. “Remarkably, many of our attacks affect multiple providers in the same way, revealing common failure patterns in independent cryptographic designs.”

The identified weaknesses are the result of an analysis of five major providers such as Sync, pCloud, Icedrive, Seafile, and Tresorit. The devised attack techniques hinge on a malicious server that’s under an adversary’s control, which could then be used to target the service providers’ users.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

A brief description of the flaws uncovered in the cloud storage systems is as follows –

  • Sync, in which a malicious server could be used to break the confidentiality of uploaded files, as well as injecting files and tampering with their content
  • pCloud, in which a malicious server could be used to break the confidentiality of uploaded files, as well as injecting files and tampering with their content
  • Seafile, in which a malicious server could be used to speed-up brute-forcing of user passwords, as well as injecting files and tampering with their content
  • Icedrive, in which a malicious server could be used to break the integrity of uploaded files, as well as injecting files and tampering with their content
  • Tresorit, in which a malicious server could be used to present non-authentic keys when sharing files and to tamper with some metadata in the storage

These attacks fall into one of the 10 broad classes that violate confidentiality, target file data and metadata, and allow for injection of arbitrary files –

  • Lack of authentication of user key material (Sync and pCloud)
  • Use of unauthenticated public keys (Sync and Tresorit)
  • Encryption protocol downgrade (Seafile),
  • Link-sharing pitfalls (Sync)
  • Use of unauthenticated encryption modes such as CBC (Icedrive and Seafile)
  • Unauthenticated chunking of files (Seafile and pCloud)
  • Tampering with file names and location (Sync, pCloud, Seafile, and Icedrive)
  • Tampering with file metadata (impacts all five providers)
  • Injection of folders into a user’s storage by combining the metadata-editing attack and exploiting a quirk in the sharing mechanism (Sync)
  • Injection of rogue files into a user’s storage (pCloud)

“Not all of our attacks are sophisticated in nature, which means that they are within reach of attackers who are not necessarily skilled in cryptography. Indeed, our attacks are highly practical and can be carried out without significant resources,” the researchers said in an accompanying paper.

“Additionally, while some of these attacks are not novel from a cryptographic perspective, they emphasize that E2EE cloud storage as deployed in practice fails at a trivial level and often does not require more profound cryptanalysis to break.”

Cybersecurity

While Icedrive has opted not to address the identified issues following responsible disclosure in late April 2024, Sync, Seafile, and Tresorit have acknowledged the report. The Hacker News has reached out to each of them for further comment, and we will update the story if we hear back.

The findings come a little over six months after a group of academics from King’s College London and ETH Zurich detailed three distinct attacks against Nextcloud’s E2EE feature that could be abused to break confidentiality and integrity guarantees.

“The vulnerabilities make it trivial for a malicious Nextcloud server to access and manipulate users’ data,” the researchers said at the time, highlighting the need to treat all server actions and server-generated inputs as adversarial to address the problems.

Back in June 2022, ETH Zurich researchers also demonstrated a number of critical security issues in the MEGA cloud storage service that could be leveraged to break the confidentiality and integrity of user data.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «hackers exploit roundcube webmail xss vulnerability to steal login credentials Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials
Next Post: THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 – Oct 20) thn cybersecurity recap: top threats, tools and news (oct 14»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.