Nearly 90% of businesses are pursuing a digital-first strategy as their processes become digitized and data-driven. To increase productivity, people are moving from communicating primarily via email to other, more convenient cloud-based collaboration services – messaging, social networks, and cloud storage (together known as EC&C – Enterprise Communication & Collaboration apps).
Why You Need to Secure Cloud Storage
While some of these channels are managed by the IT team, many are being utilized “in the shadows,” where employees are exchanging sensitive information, on a daily basis, both internally and externally with suppliers and customers.
Amongst these services are cloud storage applications like Dropbox, Box and OneDrive, which are focused on file sharing and syncing between stakeholders.
However, with the productivity gains delivered by cloud storage apps, also come new security loopholes, and consequent risks.
Despite widespread adoption, OneDrive, SharePoint, Dropbox, etc. lack the advanced security measures that have been instrumental in securing email, endpoints and networks, creating security blindspots that pose a significant cybersecurity risk.
Within cloud storage apps, people are sharing many types of files, including Office and Adobe – the same content that is being weaponized by attackers to deliver malware through email. More importantly, just like email, cloud storage is not just an internal tool but one where 60% of companies(1) are also sharing content with outside customers, suppliers and other unmanaged third parties. This means that these channels are essentially a potential entry point for an attacker to infiltrate a target and damage it.
CASB and Secure Cloud Storage
More and more organizations are starting to implement a CASB (Cloud Access Security Broker) to protect their cloud services. A CASB acts as a gatekeeper, allowing the organization to extend the reach of their security policies beyond their own infrastructure.
CASB security is designed to actively monitor access and data leakage, and to enforce policies that will ensure controlled exposure of private and sensitive organizational information.
However, CASBs are not designed for threat detection, including the detection of malicious files, URL or social-engineering attempts, nor are they able to provide forensics on any such attacks. If an organization is only reliant on CASB security for their cloud storage securit, they are likely still very exposed when it comes to the risks of cloud storage and collaboration apps.
Cloud storage-borne attacks
There are three main attack vectors targeting cloud storage that we see in the wild.
(1) Insider Threat is a malicious attack that comes from within the organization. In most cases, it comes in the form of an unhappy employee that uploads a file to the company’s shared drive for others to download.
(2) Another potential source of attack is a Malicious File or URL that enters the organization from an outside source. An example for such a case can be a supplier that syncs a malicious file with a shared folder that is used to transfer files on an ongoing basis.
(3) Impersonation (Account Take Over) is when an attacker takes over a legitimate account or inserts himself into a message thread. In this case, the attacker can send an email with a link to a malicious shared file on the drive.
A real life risk of cloud storage
Perception Point has seen several such attacks within our customer’s cloud storage platform.
One of the most interesting was an attack on a Fortune-500, 100K employee organization using OneDrive & SharePoint. Perception Point’s system identified a malicious VB script file on their OneDrive. The VB script, which included evasion techniques, was actually a worm.
Perception Point ran the malicious file in a contained environment. Once the script/worm was activated, it sent an error message stating the file has failed to start. However, the file changed all the folders in the “C” drive to shortcuts. If the user clicks on a file/shortcut, malicious code is activated.
Because the file resides in the cloud storage it would have remained undetected for a very long time, eventually impacting any employee who opened it and quite possibly the wider organization.
Read the case study here.
What you can do to secure cloud storage apps
Once understanding the full risks of cloud storage, including unprotected cloud storage services, the CISO must form a strategy to protect it. This strategy should have two main threads:
1. Security experts must treat this vector like they would treat any other point of communication with the outside world: monitor the content of the traffic, enforce policies to meet the organizational standards, and implement security measures designated to protect it.
2. Mitigate the threat once discovered. In the world of cloud storage, one successful infiltration can escalate and harm the entire organization. CISOs must leverage a holistic, centralized threat detection mechanism to monitor the threat and make sure does not spread across the network and the endpoints.
Perception Point’s solution for secure cloud storage and lowering security risks
Perception Point’s platform takes a holistic approach to cloud storage security risks, by preventing threats across all cloud services in the organization within one unified system. The same layers of protection built to protect e-mail (threat intelligence, anti-phishing, anti-impersonation, next-gen sandboxing, and more) are applied to protect cloud storage and other cloud collaboration services. Our cloud storage solution prevents malicious content (files & URLs) from being uploaded, downloaded or used to infect previously clean files across all major Cloud Storage platforms.
Are You Protected?
Get your copy of our whitepaper, Security Blind Spots in the Era of Cloud Communication & Collaboration and learn more about:
- Cyber attack trends in the collaboration channel ecosystem
- The (yet) unsolved challenges of email security – the main channel of targeted attacks
- The rising threat of cloud collaboration and the growing risk of content-borne attacks
- Proposed requirements and solutions to protect against all threats across all channels
Download it here.