This website uses cookies

Our website, platform and/or any sub domains use cookies to understand how you use our services, and to improve both your experience and our marketing relevance.

State-Sponsored Malware Spread Using Microsoft and Google Cloud Services

Updated on August 8, 2024

2 Min Read
State-Sponsored Malware Spread Using Microsoft and Google Cloud Services

State-sponsored cyber spies and criminals are increasingly leveraging legitimate cloud services to carry out their attacks, as revealed by Symantec’s threat hunters. Over the past few months, Symantec identified three such operations, uncovering new data theft and malware tools in development.

During a talk at the Black Hat infosec conference, Symantec’s Marc Elias highlighted how nation-state groups utilize cloud platforms for the same reasons legitimate organizations do: cost-efficiency and ease of avoiding detection. “Infrastructure costs are zero for these groups,” Elias explained, noting they can create free accounts on Google Drive or Microsoft without any maintenance costs. Additionally, encrypted traffic to legitimate domains makes detection challenging.

via GIPHY

One notable campaign involved a backdoor named “Grager”, used against organizations in Taiwan, Hong Kong, and Vietnam. This malware utilized Microsoft’s Graph API to communicate with its command and control server hosted on Microsoft OneDrive. Attackers created a malicious domain mimicking 7-Zip software to redirect victims, showcasing a stealthy infection chain.

Symantec’s research connected Grager to a group known as UNC5330, suspected of having ties to the Chinese government. The malware dropped a trojanized version of 7-Zip, which installed additional malicious components, including Tonerjam and the Grager backdoor.

In March, Symantec identified another backdoor under development, named “Moon_Tag”. This malware, attributed to a Chinese-speaking group, also communicated via the Graph API. More recently, a backdoor called Onedrivetools was deployed against IT services firms in the US and Europe. This malware used OneDrive for command and control, and GitHub for payload delivery, further highlighting the use of cloud services for malicious activities.

Symantec also noted the use of Whipweave, a tunneling tool suspected to be built on the Chinese VPN Free Connect (FCN) project. This tool connects to the Orbweaver Operational Relay Box (ORB) network to obfuscate malicious traffic.

Elias warned that the trend of nation-state APT groups using cloud services for stealthy campaigns is likely to grow due to its benefits. Symantec has published indicators of compromise and MITRE tactics, techniques, and procedures to aid network defenders.

As attackers continue to exploit legitimate cloud services, vigilance and robust security measures are essential for protection.

Share your opinion in the comment section. COMMENT NOW

Share This Article

Abdul Rehman

Abdul is a tech-savvy, coffee-fueled, and creatively driven marketer who loves keeping up with the latest software updates and tech gadgets. He's also a skilled technical writer who can explain complex concepts simply for a broad audience. Abdul enjoys sharing his knowledge of the Cloud industry through user manuals, documentation, and blog posts.

×

Webinar: How to Get 100% Scores on Core Web Vitals

Join Joe Williams & Aleksandar Savkovic on 29th of March, 2021.

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Want to Experience the Cloudways Platform in Its Full Glory?

Take a FREE guided tour of Cloudways and see for yourself how easily you can manage your server & apps on the leading cloud-hosting platform.

Start my tour