August 7, 2015 By Douglas Bonderud 2 min read

Man-in-the-middle (MitM) attacks have become commonplace; most organizations now deploy strong authentication strategies and encryption tactics to combat this problem. Malicious actors, however, are getting more sophisticated. According to CSO Online, cybercriminals are launching man-in-the-cloud (MitC) attacks that leverage popular file sync services to gain complete and persistent access to stored files, all without the need for user credentials.

File Sync Gains Token Appreciation

For many companies, cloud-based file services are the ideal way to accommodate increasingly mobile employees — when workers can sync files from any device, anywhere, increased productivity is the natural result. As noted by SecurityWeek, however, there’s a problem: Popular options like Dropbox, Google Drive, Microsoft OneDrive and Box are all vulnerable to cybercriminal hijackings.

To streamline file sync, these services rely on access tokens generated after users log in for the first time. These tokens are then stored in the Windows registry or Windows Credential Manager. The result is that employees aren’t required to continually re-authenticate, but as discovered by researchers from Imperva, tokens provide an ideal access point for attackers.

The Imperva team created a tool called Switcher that infects a system via email or drive-by download. A copy is made of the user’s access token, which is then replaced by one from an attacker-controlled account. After an app restart, the file service is synchronized with the attacker’s account and then the process happens in reverse — a copy of the original token is copied to the sync folder and the app is restarted again, giving cybercriminals total access to user files.

Even more worrisome? The ten lines of code needed for Switcher don’t look like malware, meaning it’s unlikely the program would get caught by current threat detection software. There’s no need for malicious actors to go after user credentials, either, since the token does all the work.

Persistent Problems

While Imperva CTO Amichai Shulman said file sync solutions “aren’t dangerous or insecure,” he noted that “it’s kind of a trade-off between usability and security.” According to ZDNet, the kind of persistent tokenization used by cloud services comes with a number of security concerns. First is the problem of passwords. Since most tokens are linked to a device rather than a session, even changing passwords won’t prevent attacker access. Users need to fully log out and change devices — or delete their accounts entirely — to get ahead of criminals.

In addition to the risks of stolen or ransomed files, there’s the problem of persistent access. It’s possible for programs like Switcher to create scheduled tasks or Windows Management Instrumentation (WMI) events triggered by specific files in the sync folder, giving them both ongoing access and the ability to leverage systems as cloud command-and-control (C&C) servers.

Ultimately, file sync services offer a huge advantage for businesses looking to leverage the power of both mobile workers and devices. Tokenization is a necessary evil here. It’s a way to simplify user access without leaving files vulnerable to standard attack vectors, but MitC attacks are a natural evolution of the medium. Bottom line? There’s no quick fix, but if companies do better than token security investments — for example, deploying file- and database-monitoring tools — it’s possible to minimize the risks of hijacked cloud accounts.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today