Security researchers have been tracking a trend: attackers are (mis)using popular cloud services for distributing malware and infiltrating targeted systems, which helps them to evade detection. They can also use legit forensics tools to steal logon credentials data, or even repurpose patch management systems to distribute their own malicious code.
Read more about it:
http://www.darkreading.com/attackers-leverage-it-tools-as-cover-/d/d-id/1318365?