Cybercriminals Host Malicious Payloads on Google Cloud Storage
#1
Quote:A malicious email campaign targeting employees of banks and financial services companies in the United States and the United Kingdom has been abusing Google Cloud Storage for payload delivery, Menlo Labs security researchers say.

As part of the attacks, the malicious actor attempts to trick users into clicking on malicious links to archive files such as .zip or .gz. The malicious payloads, which the researchers identified as being part of the Houdini and QRat malware families, were hosted on storage.googleapis.com, the domain of the Google Cloud Storage service.

With the service used by countless companies, malicious actors can bypass security controls in place within organizations or built into commercial security products by simply hosting their payloads on the domain — the practice isn’t new.

“These attackers may have chosen to use malicious links rather than malicious attachments because of the combined use of email and the web to infect victims with this threat. Many email security products can detect malicious attachments, but identify malicious URLs only if they are already in their threat repositories,” Menlo’s security researchers explain.

Source: https://www.securityweek.com/cybercrimin...ud-storage
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AMD Radeon Software Adrenalin 26.2.1 dri...
Highlights  New...harlan4096 — 12:02
Mesa 26.0 Brings Ray Tracing Updates for...
Mesa 26.0.0 ships ...harlan4096 — 12:00
Opera 127.0.5778.47
New update to Oper...harlan4096 — 11:58
AVLab.pl - Advanced In-The-Wild Malware ...
We have summarized...harlan4096 — 11:56
Apple Releases 26.3 Updates for All Its...
Apple Fixes Zero-Day...harlan4096 — 11:55

[-]
Birthdays
Today's Birthdays
avatar (46)myhotseeve
avatar (46)Edwinmub
Upcoming Birthdays
avatar (38)showercurtains
avatar (49)PeterWhink
avatar (50)neuthrusBub
avatar (30)script6027529171
avatar (46)dimaWeami
avatar (39)TranoTymn
avatar (39)MezirLal
avatar (38)Michaelaburi
avatar (46)dpascoal
avatar (51)Ronaldduh
avatar (39)legalgauch
avatar (44)Baihu
avatar (27)RaseinsLikes

[-]
Online Staff
There are no staff members currently online.

>