File synchronization services can be easily turned into an infrastructure for endpoint compromise

In the MITC attack, the attacker does not compromise explicit credentials (e.g., account name and password) of the victim. These MITC attacks rely on common file synchronization services (such as GoogleDrive and Dropbox) as their infrastructure for command and control (C&C), data exfiltration, and remote access. Without using any exploits, Minerva security researchers show how simple re-configuration of these services can turn them into a devastating attack tool that is not easily detected by common security measures.

Imperva MITC report is available here - http://www.imperva.com/docs/imperva_Hacker_Intelligence_Initiative_No22_Jul2015_v1d.pdf

George Chetcuti

Share
Published by
George Chetcuti

Recent Posts

5 ways to automate Kubernetes cluster management

While there are a several tools and platforms to automate Kubernetes cluster management, it’s important…

1 day ago

DevSecOps best practices to ensure quick and secure development

Organizations looking to unite application developers, security teams, and IT operations must implement DevSecOps best…

2 days ago

Microsoft 365 administration: More on configuring Microsoft Teams

Our Microsoft 365 administration series continues with more on configuring Microsoft Teams. In this article,…

2 days ago

Review: Powerful and secure faxing solution GFI FaxMaker

GFI FaxMaker is a powerful and complete solution that should meet the requirements of every…

2 days ago

Port in a storm: Creating port ACLs for Hyper-V for better security

There’s no rule that says that you have to make use of port ACLs, but…

3 days ago

Network appliances: A third way when servers and cloud just won’t cut it

If the cloud doesn't seem right and buying a server costs too much, maybe network…

3 days ago