• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Russian Adversaries Target DropBox and Google Drive in New Campaign

You are here: Home / General Cyber Security News / Russian Adversaries Target DropBox and Google Drive in New Campaign
July 20, 2022

Russian adversaries are using gain of dependable cloud solutions, including DropBox and Google Drive to produce malware to firms and governments, in accordance to new investigate.

Cloaked Ursula – AKA the Russian govt-linked APT29 or Cozy Bear – is progressively applying common on the web storage services since it would make attacks difficult to detect and reduce, researchers at Palo Alto Networks Device 42 wrote in a report.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Considered to have targeted numerous Western diplomatic missions and foreign embassies concerning May perhaps and June 2022, the current strategies were being masked as an agenda for an upcoming meeting with an ambassador. But the phishing paperwork contained a connection to a destructive HTML file that served as a dropper for more malicious files in the focus on network, including a Cobalt Strike payload.

Palo Alto Networks disclosed the action to Google and DropBox, which have taken motion to block it. Nevertheless, the Unit 42 researchers have warned organizations and governments to be on significant inform. “In light of APT 29’s new strategies, businesses really should be worried about their abilities to discover, inspect and halt undesirable website traffic to legit cloud storage providers.”

Cozy Bear has previously employed reputable cloud providers to deliver malware, but the two most the latest strategies leveraged Google Push cloud storage companies for the to start with time. “The ubiquitous nature of Google Push cloud storage products and services – mixed with the have confidence in that hundreds of thousands of customers throughout the world have in them – make their inclusion in this APT’s malware shipping process exceptionally regarding,” the scientists explained.

When the use of dependable cloud companies is merged with encryption, it gets to be “extremely difficult” for organizations to detect malicious action, they warned.

The attack is “hardly astonishing,” specified that companies these as these are applied by a significant amount of companies, reported unbiased security researcher Sean Wright. “It would make it tough to notify what is authentic and what is perhaps malicious, so from an attacker point of view, this is an exceptionally highly effective tool to conceal their malicious content and steps.”

To enable reduce risk, Wright suggests organizations pick a one service. In addition, Wright encouraged corporations to guarantee they use company or enterprise versions. “These frequently occur with extra controls that can enable lower the probability of attacks or aid attain more visibility to with any luck , catch them in action.”


Some parts of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «google adds support for dns over http/3 in android to keep dns Google Adds Support for DNS-over-HTTP/3 in Android to Keep DNS Queries Private
Next Post: Romanian Man Accused of Distributing Gozi Virus Extradited to US Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.