Cloud-delivered malware poses key safety challenges

0
349
Cloud-delivered malware poses key safety challenges


The quantity of cloud-based malware tripled in 2022 over the prior yr, says Netskope, with 30% of the malicious downloads coming from Microsoft OneDrive.

A digital cloud over red symbols representing malware.
Image: AndSus/Adobe Stock

As extra organizations have turned to the cloud to retailer and work with their knowledge, purposes and different belongings, cybercriminals are more and more exploiting cloud-based providers to arrange malicious downloads. A new report from community safety supplier Netskope seems on the rise in cloud-delivered malware and gives recommendations on find out how to defend your group from these threats.

SEE: Mobile machine safety coverage (TechRepublic Premium)

Jump to:

Why the shift to the cloud has led to extra cloud-based malware

The shift to hybrid and distant work has led to a better use of apps corresponding to Microsoft OneDrive, SharePoint and Microsoft Teams, and there was a dramatic rise within the variety of customers importing content material to those and different cloud-based providers in 2022: Last yr, greater than 25% of individuals world wide uploaded paperwork every day to Microsoft OneDrive, 7% to Google Drive and 5% to Microsoft SharePoint.

SEE: Hiring Kit: Cloud Engineer (TechRepublic Premium)

The supply of cloud-based malware additionally shot up in 2022, triggered by a rise within the quantity of apps being exploited to launch malware and the variety of malicious downloads from standard apps. For the yr, Netskope discovered 400 distinct cloud purposes delivering malware, virtually triple the variety of the earlier yr. Some 30% of all malicious downloads from the cloud got here from Microsoft OneDrive, adopted by 8.6% from internet hosting web site Weebly and seven.6% from the software program internet hosting web site GitHub.

Why cloud-based assaults succeed

Attacks that exploit OneDrive and different websites are profitable for 3 causes: ways, person conduct and firm coverage. For a malicious cloud-based obtain to work, the attacker should use the proper ways to add and share the malware from the cloud app. Then a person have to be duped into downloading the malware. Finally, firm coverage should enable the worker to realize entry to the malicious file.

Other forms of threats, corresponding to phishing scams, bank card skimmers and faux web sites, have helped attackers disguise their malicious content material to idiot unsuspecting victims. Some 94% of malicious internet content material seen final yr was delivered through these threats.

Where the most important will increase in malware occurred in 2022

Around the world in 2022, the most important will increase in cloud-delivered malware occurred in Australia and Europe, whereas the biggest decline was seen in North America. However, the proportion of those malicious downloads remained highest in North America, adopted by Australia, Asia and Africa. Looking at totally different industries, the biggest will increase in cloud-based malware occurred within the healthcare, manufacturing and telecom industries.

Most of the malicious file sorts downloaded from the cloud had been transportable executable information, though the quantity was truly decrease in 2022 than in 2021. The largest enhance final yr was in malicious PDF information, adopted by plaintext information, together with PowerShell, Python and different scripts. Beyond downloadable information, malicious internet content material present in phishing pages, bitcoin miners and different websites usually consisted of JavaScript that could possibly be executed by the browser.

How to defend in opposition to cloud-delivered malware

Netskope presents the next eight safety suggestions to guard organizations from this menace:

1. Use multi-layered safety

Take benefit of multi-layered and inline safety safety to dam inbound and outbound malware for all cloud and internet visitors. The proper cloud safety instruments will help you rapidly scan all content material.

2. Use granular coverage controls

Enforce the usage of granular coverage controls to limit the movement of knowledge between apps, enterprise and private entry, customers and the net. Make positive your insurance policies adapt based mostly on the machine, location and degree of danger.

3. Use cloud safety to restrict the movement of delicate knowledge

Your cloud safety ought to limit the motion of delicate knowledge to forestall it from reaching unauthorized units, apps and situations.

4. Use real-time teaching to assist your customers

Real-time teaching and coaching can educate your customers to make use of safer apps to guard their knowledge and supply the proper authentication for any uncommon conditions.

5. Use distant browser isolation to scale back shopping dangers

With distant browser isolation, you’ll be able to scale back the chance of shopping newly-registered domains, newly-observed domains and uncategorized web sites.

6. Turn to multi-factor authentication

To defend in opposition to the usage of stolen account credentials, implement multi-factor authentication and lengthen it to incorporate unmanaged apps by way of your identification service supplier or safety service edge platform.

7. Take benefit of behavioral analytics

Use behavioral analytics to scan for compromised accounts and units in addition to insider threats.

8. Implement zero belief safety insurance policies

Apply zero belief insurance policies to make sure least privilege entry to delicate knowledge. Make positive that your insurance policies present ongoing monitoring and reporting to disclose any unknown dangers or threats.

Make your group safer with our Zero Trust Cheat Sheet or watch our Top 5 issues it’s good to find out about zero belief.

LEAVE A REPLY

Please enter your comment!
Please enter your name here