August 7, 2015 By Douglas Bonderud 2 min read

Man-in-the-middle (MitM) attacks have become commonplace; most organizations now deploy strong authentication strategies and encryption tactics to combat this problem. Malicious actors, however, are getting more sophisticated. According to CSO Online, cybercriminals are launching man-in-the-cloud (MitC) attacks that leverage popular file sync services to gain complete and persistent access to stored files, all without the need for user credentials.

File Sync Gains Token Appreciation

For many companies, cloud-based file services are the ideal way to accommodate increasingly mobile employees — when workers can sync files from any device, anywhere, increased productivity is the natural result. As noted by SecurityWeek, however, there’s a problem: Popular options like Dropbox, Google Drive, Microsoft OneDrive and Box are all vulnerable to cybercriminal hijackings.

To streamline file sync, these services rely on access tokens generated after users log in for the first time. These tokens are then stored in the Windows registry or Windows Credential Manager. The result is that employees aren’t required to continually re-authenticate, but as discovered by researchers from Imperva, tokens provide an ideal access point for attackers.

The Imperva team created a tool called Switcher that infects a system via email or drive-by download. A copy is made of the user’s access token, which is then replaced by one from an attacker-controlled account. After an app restart, the file service is synchronized with the attacker’s account and then the process happens in reverse — a copy of the original token is copied to the sync folder and the app is restarted again, giving cybercriminals total access to user files.

Even more worrisome? The ten lines of code needed for Switcher don’t look like malware, meaning it’s unlikely the program would get caught by current threat detection software. There’s no need for malicious actors to go after user credentials, either, since the token does all the work.

Persistent Problems

While Imperva CTO Amichai Shulman said file sync solutions “aren’t dangerous or insecure,” he noted that “it’s kind of a trade-off between usability and security.” According to ZDNet, the kind of persistent tokenization used by cloud services comes with a number of security concerns. First is the problem of passwords. Since most tokens are linked to a device rather than a session, even changing passwords won’t prevent attacker access. Users need to fully log out and change devices — or delete their accounts entirely — to get ahead of criminals.

In addition to the risks of stolen or ransomed files, there’s the problem of persistent access. It’s possible for programs like Switcher to create scheduled tasks or Windows Management Instrumentation (WMI) events triggered by specific files in the sync folder, giving them both ongoing access and the ability to leverage systems as cloud command-and-control (C&C) servers.

Ultimately, file sync services offer a huge advantage for businesses looking to leverage the power of both mobile workers and devices. Tokenization is a necessary evil here. It’s a way to simplify user access without leaving files vulnerable to standard attack vectors, but MitC attacks are a natural evolution of the medium. Bottom line? There’s no quick fix, but if companies do better than token security investments — for example, deploying file- and database-monitoring tools — it’s possible to minimize the risks of hijacked cloud accounts.

More from

What cybersecurity pros can learn from first responders

4 min read - Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything.But are they actually prepared? Compared to the readiness of traditional first responders, how do cybersecurity professionals in incident response stand up? Let’s dig deeper into whether the same sense of urgency exists in…

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Stealthy WailingCrab Malware misuses MQTT Messaging Protocol

14 min read - This article was made possible thanks to the hard work of writer Charlotte Hammond and contributions from Ole Villadsen and Kat Metrick. IBM X-Force researchers have been tracking developments to the WailingCrab malware family, in particular, those relating to its C2 communication mechanisms, which include misusing the Internet-of-Things (IoT) messaging protocol MQTT. WailingCrab, also known as WikiLoader, is a sophisticated, multi-component malware delivered almost exclusively by an initial access broker that X-Force tracks as Hive0133, which overlaps with TA544. WailingCrab…

Operationalize cyber risk quantification for smart security

4 min read - Organizations constantly face new tactics from cyber criminals who aim to compromise their most valuable assets. Yet despite evolving techniques, many security leaders still rely on subjective terms, such as low, medium and high, to communicate and manage cyber risk. These vague terms do not convey the necessary detail or insight to produce actionable outcomes that accurately identify, measure, manage and communicate cyber risks. As a result, executives and board members remain uninformed and ill-prepared to manage organizational risk effectively.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today