Kaspersky looks into cybercriminals and cloud services
By Digital News Asia July 14, 2014
- Using cloud service for purposes they were not designed for can be harmful
- 30% of malware in cloud folders on home computers planted via synchronisation
ALTHOUGH cloud-based file storage services have long been popular among Internet users, the indisputable convenience of such services is to some extent offset by a number of risks, Kaspersky Lab said in a statement.
For example, many users follow the advice of gurus and store scans of their passports and other documents in the cloud – though sometimes vulnerabilities in the service jeopardise the security of their personal data.
At the same time, using cloud technologies for purposes other than those for which they were designed can do even more harm, the company argued.
For example, it’s easy to find sets of instructions for computer owners who want to use such services effectively to remotely control and monitor their machines, control torrent downloads, etc. By following these recommendations, users inadvertently create different kinds of security gaps which can be easily exploited by cybercriminals – particularly in the case of targeted attacks.
Kaspersky Lab experts decided to have a closer look at the risk of a corporate network being infected via cloud services.
One possible scenario is cybercriminals gaining control of an employee’s laptop via a Dropbox client installed on it. This could happen when the employee is away from the office.
If infected documents are placed in cloud folders, Dropbox will automatically copy them to all devices connected to the corporate network that also run the same service, Kaspersky Lab said.
Dropbox is not unique in this respect – all popular cloud storage applications, including Onedrive (a.k.a. Skydrive), Google Disk, Yandex Disk, etc., have automatic synchronisation features.
This is why Kaspersky Lab experts decided to find out whether cybercriminals actually use these features to distribute malware.
After collecting data from consenting Kaspersky Lab users, the analysts determined that about 30% of the malware found in cloud folders on home computers is planted via synchronisation mechanisms. For corporate users, the figure reaches 50%.
It should be noted that there is a certain difference between corporate and home users: the former more typically have infected Microsoft Office files in their cloud folders, while on the computers of the latter these often co-exist with malicious Android apps.
“A careful analysis of statistics has shown that the risk of the corporate network being infected via cloud storage is currently relatively low – one corporate user in 1,000 risks having his or her computer infected during a one-year period,” said Kirill Kruglov, senior research developer at Kaspersky Lab.
“However, it should be kept in mind that in some cases, even one infected computer can result in an outbreak engulfing the entire network and causing significant damage.
“Configuring the firewall to block access to these services is a painstaking process, which requires constant updates of firewall settings,” he added.
A standard recommendation for system administrators in this case is to install a fully functional security suite featuring heuristic and behavioural antivirus protection, access control (HIPS), operating system control (System Watcher or Hypervisor), protection against vulnerability exploitation, etc. on each workstation on the network.
Cloud stoking demand for network security in Asia Pacific: Frost & Sullivan
Cloud adoption shaken by Snowden revelations: Survey
Security on the cloud: Myths dispelled
Cloud use in SEA facing 'rogue cloud' challenge: Symantec
For more technology news and the latest updates, follow us on Twitter, LinkedIn or Like us on Facebook.