Netskope est à nouveau reconnu comme leader dans le Magic Quadrant de Gartner®™ pour les plates-formes SASE. Obtenir le rapport

fermer
fermer
Le réseau de demain
Le réseau de demain
Planifiez votre chemin vers un réseau plus rapide, plus sûr et plus résilient, conçu pour les applications et les utilisateurs que vous prenez en charge.
          Essayez Netskope
          Mettez la main à la pâte avec la plateforme Netskope
          C'est l'occasion de découvrir la plateforme Netskope One single-cloud de première main. Inscrivez-vous à des laboratoires pratiques à votre rythme, rejoignez-nous pour des démonstrations mensuelles de produits en direct, faites un essai gratuit de Netskope Private Access ou participez à des ateliers dirigés par un instructeur.
            Un leader sur SSE. Désormais leader en matière de SASE à fournisseur unique.
            Netskope est reconnu comme le leader le plus avancé dans sa vision pour les plateformes SSE et SASE.
            2X est un leader dans le Magic Quadrant de Gartner® pour les plateformes SASE
            Une plateforme unifiée conçue pour votre parcours
              Sécuriser l’IA générative pour les nuls
              Sécuriser l’IA générative pour les nuls
              Découvrez comment votre organisation peut concilier le potentiel d'innovation de l'IA générative avec des pratiques robustes en matière de sécurité des données.
                Prévention des pertes de données (DLP) pour les Nuls eBook
                La prévention moderne des pertes de données (DLP) pour les Nuls
                Obtenez des conseils et des astuces pour passer à un système de prévention des pertes de données (DLP) dans le nuage.
                  Réseau SD-WAN moderne avec SASE pour les nuls
                  SD-WAN moderne pour les nuls en SASE
                  Cessez de rattraper votre retard en matière d'architecture de réseau
                    Identification des risques
                    Advanced Analytics transforme la façon dont les équipes chargées des opérations de sécurité utilisent les données pour mettre en œuvre de meilleures politiques. Avec Advanced Analytics, vous pouvez identifier les tendances, cibler les domaines préoccupants et utiliser les données pour prendre des mesures.
                        Support technique de Netskope
                        Support technique de Netskope
                        Nos ingénieurs d'assistance qualifiés sont répartis dans le monde entier et possèdent des expériences diverses dans les domaines de la sécurité du cloud, des réseaux, de la virtualisation, de la diffusion de contenu et du développement de logiciels, afin de garantir une assistance technique rapide et de qualité
                          Vidéo Netskope
                          Formation Netskope
                          Grâce à Netskope, devenez un expert de la sécurité du cloud. Nous sommes là pour vous aider à achever votre transformation digitale en toute sécurité, pour que vous puissiez profiter pleinement de vos applications cloud, Web et privées.

                            Two Recent Campaigns from Brazil and Korea Exploiting Legitimate Cloud Services

                            Jun 13 2024

                            The exploitation of cloud services is a flexible weapon in the hands of attackers, so flexible that we uncover new campaigns abusing legitimate apps on a daily basis. Whether threat actors are driven by cybercrime or cyberespionage, they continue to target different audiences in different geographical regions of the world, exploiting different services in different phases of the attack chain (primarily delivery and distribution of malware, but also command and control, alongside the emerging spearphishing campaigns tailored specifically to target cloud accounts).

                            Two recent examples bring us to Brazil and Korea, where two distinct operations provided additional, unneeded, proofs of how legitimate internet services can be easily adapted for multiple roles and multiple purposes over the course of a malicious operation. 

                            In May, researchers at HarfangLab in Brazil discovered a malicious campaign delivering a payload named “AllaSenha” (yet another variant of an old acquaintance for users in Latin america: AllaKore, an open source remote access tool). This variant, characterized by an intricate infection chain involving Python scripts and a Delphi-developed loader, is specifically aimed at stealing credentials of Brazilian bank accounts and also leveraging Azure as its command and control (C2) infrastructure. Azure is particularly flexible for the attackers, as it provides multiple tools that can be abused, and not only by opportunistic criminals. For example, in February 2024, researchers at Mandiant discovered a cyberespionage campaign carried out by an Iranian threat actor tracked as UNC1549, exploiting a network of over 125 Azure command-and-control (C2) subdomains.

                            Nearly at the same time, researchers at AhnLab found out that cybercriminals were quite busy in South Korea, distributing a malware cocktail (remote access Trojans, cryptocurrency miners, malware downloaders, proxy tools, and anti-AV programs) through cracked versions of Microsoft Office (once again a warning to not install unapproved applications on corporate devices). Unsurprisingly, the cracked installer sporting a well-crafted interface, launched in background an obfuscated .NET malware that contacts a Telegram or Mastodon channel to receive a valid download URL from Google Drive or GitHub from where it downloads an obfuscated payload containing the PowerShell command that ultimately, at the end of the complex attack chain, installs the malware strains onto the system.

                            While these attacks may be in different countries, involve different threat actors, and have different motivations, a common denominator is the exploitation of legitimate services to make the attack more evasive, concealing the malicious traffic inside legitimate sessions directed to trusted applications too often allow listed by organizations, or at least not inspected adequately.

                            Mitigating the risk of legitimate cloud services exploited for malware distribution or command and control

                            Azure, Google Drive, and GitHub are among the thousands of cloud services where the Netskope Next Gen SWG can provide adaptive access control, threat protection, and data loss prevention with a granularity that is impossible for any other web security technology. So, in cases where these services or similar cloud storage apps are not needed by the organization, but are exploited by external attackers to deliver a malicious payload or to host the command and control infrastructure, it is possible to configure a policy for preventing potentially dangerous activities (such as “Upload” and “Download”) from the specific service or the entire category where it belongs.

                            Netskope customers are also protected against malware distributed from the cloud (and the web in general) by Netskope Threat Protection. Netskope Threat Protection scans web and cloud traffic to detect known and unknown threats with a comprehensive set of engines, including signature-based AV, machine learning detectors for executables and Office documents, and sandboxing with patient zero protection. The threat protection capabilities can be further improved through Netskope Cloud Exchange, which provides powerful integrations to leverage investments across users’ security posture through integration with third-party tools, such as threat intelligence feeds, endpoint protection, and email protection technologies.

                            Finally, Netskope Advanced Analytics provides specific dashboards to assess the risk of rogue cloud instances being exploited to deliver malware or the risk of becoming the target of anomalous communications, with rich details and insights, supporting security teams in the analysis and mitigation/remediation process.

                            Stay safe!

                            author image
                            Paolo Passeri
                            Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
                            Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
                            Connectez-vous avec Netskope

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.