閉める
閉める
明日に向けたネットワーク
明日に向けたネットワーク
サポートするアプリケーションとユーザー向けに設計された、より高速で、より安全で、回復力のあるネットワークへの道を計画します。
            Netskopeを体験しませんか?
            Netskopeプラットフォームを実際に体験する
            Netskope Oneのシングルクラウドプラットフォームを直接体験するチャンスです。自分のペースで進められるハンズオンラボにサインアップしたり、毎月のライブ製品デモに参加したり、Netskope Private Accessの無料試乗に参加したり、インストラクター主導のライブワークショップに参加したりできます。
              SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
              Netskope は、 SSE プラットフォームと SASE プラットフォームの両方で、ビジョンで最も優れたリーダーとして認められています
              2X ガートナーマジック クアドラント SASE プラットフォームのリーダー
              旅のために構築された 1 つの統合プラットフォーム
                ""
                Netskope One AI Security
                Organizations need secure AI to move their business forward, but controls and guardrails must not require sacrifices in speed or user experience. Netskope can help you say yes to the AI advantage.
                  ""
                  Netskope One AI Security
                  Organizations need secure AI to move their business forward, but controls and guardrails must not require sacrifices in speed or user experience. Netskope can help you say yes to the AI advantage.
                    ダミーのための最新のデータ損失防止(DLP)eBook
                    最新の情報漏えい対策(DLP)for Dummies
                    クラウド配信型 DLP に移行するためのヒントとコツをご紹介します。
                      SASEダミーのための最新のSD-WAN ブック
                      SASEダミーのための最新のSD-WAN
                      遊ぶのをやめる ネットワークアーキテクチャに追いつく
                        リスクがどこにあるかを理解する
                        Advanced Analytics は、セキュリティ運用チームがデータ主導のインサイトを適用してより優れたポリシーを実装する方法を変革します。 Advanced Analyticsを使用すると、傾向を特定し、懸念事項に的を絞って、データを使用してアクションを実行できます。
                            Netskopeテクニカルサポート
                            Netskopeテクニカルサポート
                            クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発など、多様なバックグラウンドを持つ全世界にいる有資格のサポートエンジニアが、タイムリーで質の高い技術支援を行っています。
                              Netskopeの動画
                              Netskopeトレーニング
                              Netskopeのトレーニングは、クラウドセキュリティのエキスパートになるためのステップアップに活用できます。Netskopeは、お客様のデジタルトランスフォーメーションの取り組みにおける安全確保、そしてクラウド、Web、プライベートアプリケーションを最大限に活用するためのお手伝いをいたします。

                                Cloud Threats Memo: A Parasite Exploiting Legitimate Cloud Services

                                Dec 01 2023

                                Malicious browser extensions are a common attack vector used by threat actors to steal sensitive information, such as authentication cookies or login credentials, or to manipulate financial transactions.

                                In the latest example of a similar threat, researchers from Trend Micro have discovered a malicious Google Chrome extension (also working on Chromium-based browsers such as Microsoft Edge, Brave, and Opera,) named “ParaSiteSnatcher” and specifically designed to target users in Latin America. It particularly focuses on Brazilian targets, given that the malicious extension is able to exfiltrate data from several local banks, such as Banco do Brasil and Caixa Econômica Federal, or also to initiate and manipulate transactions in local payment methods such as PIX or Boleto Bancario. In addition, it can also exfiltrate Brazilian Tax ID numbers, for both individuals and businesses, and cookies, unsurprisingly even those used for Microsoft accounts. 

                                But another interesting characteristic of ParaSiteSnatcher is in the way the payload is delivered to the victim, leveraging a VBScript downloader hosted on Dropbox, and also in the way it establishes communication with the attacker’s command and control infrastructure, obtaining a list of obfuscated URLs from Google Cloud Storage, a technique known as Dead Drop Resolver.

                                Yet another example of two legitimate cloud services exploited for malicious purposes by threat actors. Not only do legitimate cloud services have the implicit trust from individuals and enterprises (which should rather adopt a zero trust approach,) but they are also able to evade legacy secure web gateways, which don’t have the needed contextual awareness to enable adaptive, least-privileged access to applications and data. Finally they provide the attackers with a platform to launch their malicious campaigns, which is simple to manage, immediately available, and resilient: in practice, the same characteristics that drive organizations to move their data and applications to the cloud.

                                Mitigating the risks of legitimate cloud services exploited for malicious purposes

                                Dropbox and Google Cloud Storage are among the thousands of cloud services where the Netskope Next Gen SWG can provide adaptive access control, threat protection, and data loss prevention. They are also among the hundreds of cloud services for which instance detection is available. So, in cases where these apps are exploited to deliver a malicious payload, or to host the command and control infrastructure, it is possible to configure a policy for preventing potentially dangerous activities (such as “Upload” and “Download”) if those apps are not needed by the organization, singularly or as a category. Instead, in case the same apps are in use by the organization, it is possible to configure a policy for preventing any risky activities from non-corporate instances only, mitigating the risk of malware delivery and data exfiltration.

                                Netskope customers are also protected against malware distributed from a legitimate cloud service and the web in general by Netskope Threat Protection, which scans web and cloud traffic to detect known and unknown threats with a comprehensive set of engines, including signature-based AV, machine learning detectors for executables and Office documents, and sandboxing with patient zero protection. Netskope threat intelligence can also detect command and control connections even if they are directed to a legitimate cloud service.

                                Netskope Cloud Exchange provides powerful integration tools to leverage investments across users’ security posture through integration with third-party tools, such as threat intelligence feeds and endpoint detection technologies.

                                Finally, Netskope Advanced Analytics provides specific dashboards to assess the risk of rogue cloud instances being exploited to deliver malware or the risk of becoming the target of anomalous communications, with rich details and insights, supporting security teams in the analysis and mitigation/remediation process.

                                Stay safe!

                                author image
                                Paolo Passeri
                                Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
                                Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
                                Netskopeとつながる

                                Subscribe to the Netskope Blog

                                Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.