Netskopeは、2025年ガートナー、SASEプラットフォームのマジック・クアドラントで再びリーダーの1社として評価をいただきました。レポートを入手する

閉める
閉める
明日に向けたネットワーク
明日に向けたネットワーク
サポートするアプリケーションとユーザー向けに設計された、より高速で、より安全で、回復力のあるネットワークへの道を計画します。
          Netskopeを体験しませんか?
          Netskopeプラットフォームを実際に体験する
          Netskope Oneのシングルクラウドプラットフォームを直接体験するチャンスです。自分のペースで進められるハンズオンラボにサインアップしたり、毎月のライブ製品デモに参加したり、Netskope Private Accessの無料試乗に参加したり、インストラクター主導のライブワークショップに参加したりできます。
            SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。
            Netskope は、 SSE プラットフォームと SASE プラットフォームの両方で、ビジョンで最も優れたリーダーとして認められています
            2X ガートナーマジック クアドラント SASE プラットフォームのリーダー
            旅のために構築された 1 つの統合プラットフォーム
              ダミーのためのジェネレーティブAIの保護
              ダミーのためのジェネレーティブAIの保護
              ジェネレーティブ AI の革新的な可能性と堅牢なデータ セキュリティ プラクティスのバランスを取る方法をご覧ください。
                ダミーのための最新のデータ損失防止(DLP)eBook
                最新の情報漏えい対策(DLP)for Dummies
                クラウド配信型 DLP に移行するためのヒントとコツをご紹介します。
                  SASEダミーのための最新のSD-WAN ブック
                  SASEダミーのための最新のSD-WAN
                  遊ぶのをやめる ネットワークアーキテクチャに追いつく
                    リスクがどこにあるかを理解する
                    Advanced Analytics は、セキュリティ運用チームがデータ主導のインサイトを適用してより優れたポリシーを実装する方法を変革します。 Advanced Analyticsを使用すると、傾向を特定し、懸念事項に的を絞って、データを使用してアクションを実行できます。
                        Netskopeテクニカルサポート
                        Netskopeテクニカルサポート
                        クラウドセキュリティ、ネットワーキング、仮想化、コンテンツ配信、ソフトウェア開発など、多様なバックグラウンドを持つ全世界にいる有資格のサポートエンジニアが、タイムリーで質の高い技術支援を行っています。
                          Netskopeの動画
                          Netskopeトレーニング
                          Netskopeのトレーニングは、クラウドセキュリティのエキスパートになるためのステップアップに活用できます。Netskopeは、お客様のデジタルトランスフォーメーションの取り組みにおける安全確保、そしてクラウド、Web、プライベートアプリケーションを最大限に活用するためのお手伝いをいたします。

                            Cloud Threats Memo: North-Korean State-Sponsored Threat Actors Continue to Exploit Legitimate Cloud Services

                            May 04 2023

                            Be the first to receive the Cloud Threats Memo directly in your inbox by subscribing here.

                            While the most common cloud apps are also the most exploited for delivering malicious content, opportunistic and state-sponsored threat actors are constantly looking for additional cloud services to leverage throughout multiple stages of the attack chain.

                            The growing exploitation of cloud services has led the main cloud service providers to enforce restrictive controls to mitigate the risk of possible abuse of their services. And even though a less known service means a lower chance of success for the attackers (the users could be uncomfortable with downloading or accessing content from a cloud application they are not familiar with), there are still more advantages than drawbacks: a cloud service offers simplified hosting and the corresponding malicious traffic is easily hidden among the legitimate sessions.

                            In a recent example, discovered by researchers at ESET while investigating the recent supply-chain attack to 3CX carried out by the infamous North Korean threat actor Lazarus Group, the same attackers deployed an unknown Linux malware disguised as a PDF document distributed via spear phishing or direct messages. The malware was distributed as part of a new campaign, considered a follow-up to Operation Dream Job, targeting people working in software or DeFi platforms with fake job offers on social media.

                            The first stage payload of this campaign is a downloader, dubbed OdicLoader by the researchers, that when executed displays a decoy PDF document, and then downloads a second-stage backdoor from the OpenDrive (no it is not OneDrive!) cloud storage service.

                            It is interesting to note that the Lazarus Group has a certain predisposition to exploit cloud services in their campaigns: even in the case of the 3CX attack, the threat actors exploited GitHub in a complex multi-stage attack chain where the trojanized 3CX client downloaded apparently innocuous icon files from GitHub, encoding the information needed to download the information stealer in the next stage of the attack: an unprecedented variant of the Dead Drop Resolver technique.

                            How Netskope mitigates the risk of legitimate cloud services exploited by threat actors

                            Although OpenDrive is maybe not one of the most common cloud storage services, it is certainly one where the Netskope Next Gen SWG can provide granular access control, threat protection, and DLP capabilities (the app connector is able to recognize the following activities: “Create”, “Delete”, “Download”, “Edit”, “Login Attempt”, “Login Failed”, “Login Successful”, “Logout”, “Share”, “Upload”, “View”, and to enforce DLP policies for the “Download” and “Upload” activities, a much deeper visibility than legacy SWGs).

                            The organization might decide to completely block access to the unneeded cloud storage service, or simply prevent specific, potentially dangerous activities (such as “Download” or “Upload”).

                            A similar policy can also be applied to GitHub, with the additional advantage that GitHub is also among the hundreds of services for which instance detection is available. So if an unknown instance of a corporate cloud service like GitHub is exploited as a command and control, dead drop resolver, or a malware distribution point, it is possible to configure a policy that prevents potentially dangerous activities just from non-corporate instances.

                            Netskope customers are also protected against malware distributed from a legitimate cloud service and the web in general by Netskope Threat Protection. Netskope Threat Protection scans web and cloud traffic to detect known and unknown threats with a comprehensive set of engines, including signature-based AV, machine learning-based detectors for executables and Office documents, and sandboxing, including patient zero protection.

                            Netskope Cloud Exchange provides powerful integration tools to leverage investments across their security posture through integration with third-party tools, such as threat intelligence feeds and endpoint detection technologies.

                            Finally, Netskope Advanced Analytics provides specific dashboards to assess the risk of rogue cloud instances being exploited to deliver malware or becoming the target of anomalous communications, with rich details and insights, supporting security teams in the analysis and mitigation/remediation process.

                            Stay safe!

                            author image
                            Paolo Passeri
                            Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
                            Paolo supports Netskope’s customers in protecting their journey to the cloud and is a security professional, with 20+ years experience in the infosec industry.
                            Netskopeとつながる

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.