August 7, 2015 By Douglas Bonderud 2 min read

Man-in-the-middle (MitM) attacks have become commonplace; most organizations now deploy strong authentication strategies and encryption tactics to combat this problem. Malicious actors, however, are getting more sophisticated. According to CSO Online, cybercriminals are launching man-in-the-cloud (MitC) attacks that leverage popular file sync services to gain complete and persistent access to stored files, all without the need for user credentials.

File Sync Gains Token Appreciation

For many companies, cloud-based file services are the ideal way to accommodate increasingly mobile employees — when workers can sync files from any device, anywhere, increased productivity is the natural result. As noted by SecurityWeek, however, there’s a problem: Popular options like Dropbox, Google Drive, Microsoft OneDrive and Box are all vulnerable to cybercriminal hijackings.

To streamline file sync, these services rely on access tokens generated after users log in for the first time. These tokens are then stored in the Windows registry or Windows Credential Manager. The result is that employees aren’t required to continually re-authenticate, but as discovered by researchers from Imperva, tokens provide an ideal access point for attackers.

The Imperva team created a tool called Switcher that infects a system via email or drive-by download. A copy is made of the user’s access token, which is then replaced by one from an attacker-controlled account. After an app restart, the file service is synchronized with the attacker’s account and then the process happens in reverse — a copy of the original token is copied to the sync folder and the app is restarted again, giving cybercriminals total access to user files.

Even more worrisome? The ten lines of code needed for Switcher don’t look like malware, meaning it’s unlikely the program would get caught by current threat detection software. There’s no need for malicious actors to go after user credentials, either, since the token does all the work.

Persistent Problems

While Imperva CTO Amichai Shulman said file sync solutions “aren’t dangerous or insecure,” he noted that “it’s kind of a trade-off between usability and security.” According to ZDNet, the kind of persistent tokenization used by cloud services comes with a number of security concerns. First is the problem of passwords. Since most tokens are linked to a device rather than a session, even changing passwords won’t prevent attacker access. Users need to fully log out and change devices — or delete their accounts entirely — to get ahead of criminals.

In addition to the risks of stolen or ransomed files, there’s the problem of persistent access. It’s possible for programs like Switcher to create scheduled tasks or Windows Management Instrumentation (WMI) events triggered by specific files in the sync folder, giving them both ongoing access and the ability to leverage systems as cloud command-and-control (C&C) servers.

Ultimately, file sync services offer a huge advantage for businesses looking to leverage the power of both mobile workers and devices. Tokenization is a necessary evil here. It’s a way to simplify user access without leaving files vulnerable to standard attack vectors, but MitC attacks are a natural evolution of the medium. Bottom line? There’s no quick fix, but if companies do better than token security investments — for example, deploying file- and database-monitoring tools — it’s possible to minimize the risks of hijacked cloud accounts.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today