Netskope named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Service Edge. Get the Report.

  • Platform

    Unrivaled visibility and real-time data and threat protection on the world's largest security private cloud.

  • Products

    Netskope products are built on the Netskope Security Cloud.

Netskope delivers a modern cloud security stack, with unified capabilities for data and threat protection, plus secure private access.

Explore our platform
Birds eye view metropolitan city

Netskope Named a Leader in the 2022 Gartner Magic Quadrant™ for SSE Report

Get the report Go to Products Overview
Netskope gartner mq 2022 sse leader

Make the move to market-leading cloud security services with minimal latency and high reliability.

Learn more
Lighted highway through mountainside switchbacks

Prevent threats that often evade other security solutions using a single-pass SSE framework.

Learn more
Lighting storm over metropolitan area

Zero trust solutions for SSE and SASE deployments

Learn more
Boat driving through open sea

Netskope enables a safe, cloud-smart, and fast journey to adopt cloud services, apps, and public cloud infrastructure.

Learn more
Wind turbines along cliffside
  • Customer Success

    Secure your digital transformation journey and make the most of your cloud, web, and private applications.

  • Customer Support

    Proactive support and engagement to optimize your Netskope environment and accelerate your success.

  • Training and Certification

    Netskope training will help you become a cloud security expert.

Trust Netskope to help you address evolving threats, new risks, technology shifts, organizational and network changes, and new regulatory requirements.

Learn more
Woman smiling with glasses looking out window

We have qualified engineers worldwide, with diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ready to give you timely, high-quality technical assistance.

Learn more
Bearded man wearing headset working on computer

Secure your digital transformation journey and make the most of your cloud, web, and private applications with Netskope training.

Learn more
Group of young professionals working
  • Resources

    Learn more about how Netskope can help you secure your journey to the cloud.

  • Blog

    Learn how Netskope enables security and networking transformation through security service edge (SSE).

  • Events & Workshops

    Stay ahead of the latest security trends and connect with your peers.

  • Security Defined

    Everything you need to know in our cybersecurity encyclopedia.

Security Visionaries Podcast

Bonus Episode: The Importance of Security Service Edge (SSE)

Play the podcast
Black man sitting in conference meeting

Read the latest on how Netskope can enable the Zero Trust and SASE journey through security service edge (SSE) capabilities.

Read the blog
Sunrise and cloudy sky

Netskope CSO speaking events

Meet the Netskope CSO team at one of our upcoming events.

Find an event
Netskope CSO Team

What is Security Service Edge?

Explore the security side of SASE, the future of network and protection in the cloud.

Learn more
Four-way roundabout
  • Company

    We help you stay ahead of cloud, data, and network security challenges.

  • Why Netskope

    Cloud transformation and work from anywhere have changed how security needs to work.

  • Leadership

    Our leadership team is fiercely committed to doing everything it takes to make our customers successful.

  • Partners

    We partner with security leaders to help you secure your journey to the cloud.

Netskope enables the future of work.

Find out more
Curvy road through wooded area

Netskope is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Learn more
Switchback road atop a cliffside

Thinkers, builders, dreamers, innovators. Together, we deliver cutting-edge cloud security solutions to help our customers protect their data and people.

Meet our team
Group of hikers scaling a snowy mountain

Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.

Learn more
Group of diverse young professionals smiling
Blog Threat Labs Cloud Threats Memo: Scary Examples of Weaponizing Google Drive
Nov 18 2021

Cloud Threats Memo: Scary Examples of Weaponizing Google Drive

The abuse of Google Drive to deliver malicious content continues, and two recent examples remind us how the flexibility of this cloud storage tool can be easily weaponized by malicious actors. And the spectrum of content that can be distributed, and victims that can be targeted is surprising.

In the first example, attributed to a group of hackers recruited in a Russian-speaking forum, the Google Threat Analysis Group has dismantled a financially motivated phishing campaign targeting YouTubers with Cookie Theft malware, a session hijacking technique that enables access to user accounts with session cookies stored in the browser. The purpose of this campaign, luring the victims with fake collaboration opportunities, was to hijack their YouTube channel and then either sell it or use it for cryptocurrency scams.

The phishing typically started with a customized email introducing a company and its products (1,011 domains, some of them impersonating legitimate companies), and once the target agreed to the deal, a malware landing page disguised as a software download URL was sent via email or a PDF on Google Drive, and in a few cases, Google Documents containing the phishing links. To give you an idea of how easily these services can be exploited for large-scale campaigns, Google identified around 15,000 accounts, some of which were explicitly created for this campaign.

An additional (literally) scary campaign spotted by Cofense has delivered the MirCop ransomware via an articulated multi-stage kill chain where once again Google Drive plays an important (initial) role. This specific attack started via a business-related email, suggesting a previous agreement between the sender and the victim, and containing the link to a supposed “DWG following Supplies List” hosted on a Google Drive URL. Besides evading Secure Email Gateways, Google Drive provides legitimacy to the email and in the user’s mind is also associated with a service used to exchange business communications. The linked document is an MHT file (a web archive file type) that, once executed, downloads a RAR compressed file. The RAR archive itself contains an executable, a DotNET loader that uses VBS scripts to drop and run the MIRCOP ransomware. And yes, this infection is scary since, among other things, the ransomware changes the home screen to a gory image.

These two examples demonstrate how simply Google Drive can be weaponized for large-scale campaigns in multiple ways. And these examples are not the only ones: a simple search on URLhaus is worth more than a thousand words (do you recognize two old acquaintances such as BazarLoader and GuLoader?)

How Netskope mitigates the risk of rogue cloud instances abused to deliver malicious content

There are multiple stages of the attack chain where the Netskope Next-Gen SWG can mitigate this threat.

  • It is possible to block the access (and in general enforce granular controls) to dozens of non-corporate cloud services such as Google Drive (including personal instances of corporate services or non-corporate instances abused by the attackers).
  • Downloading a malicious document from a web page or a cloud service can be prevented by the Threat Protection Engine that offers multiple engines including signature-based AV, advanced heuristics, sandboxing, and a ML-based scanner for malicious documents and executables.
  • Any redirection within the kill chain can be prevented by the content filtering engine that offers 16 granular security risk categories, including phishing and malware distribution points.
  • The Cloud Threat Exchange, a component of Netskope Cloud Exchange improves attack neutralization via bi-directional automated IoC sharing (hashes, IPs, domains, and URLs) with third-parties such as EDR technologies and threat intelligence feeds.
  • Netskope Advanced Analytics provides a specific Threat Protection Dashboard with rich insights on malicious traffic to non-corporate cloud instances and web pages, most targeted users, top applications exploited to deliver malicious content, etc. A valuable tool for SOC teams and Incident responders.

Stay safe!

author image
About the author
Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry. He is the mastermind behind hackmageddon.com, a blog detailing timelines and statistics of all the main cyber-attacks occurred since 2011. It is the primary source of data and trends of the threat landscape for the Infosec community.
Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry. He is the mastermind behind hackmageddon.com, a blog detailing timelines and statistics of all the main cyber-attacks occurred since 2011. It is the primary source of…