Cloud services are increasing the surface of attack of corporate networks. For instance, we associate usually to file sharing services the risk of leak of confidential information. This is a real threat. These services may also present another more lethal threat: become Command and Control channels (C&C). C&C is used by botnets or Trojans to communicate with the infected machines.
At Black Hat 2013, Jake Williams presented DropSmack: a C&C tool dedicated to dropbox. In his paper, he explains the genesis of this tool. It is a well documented story of an advanced penetration test (worthwhile to read, if you’re not familiar with these tests). The interesting part of the story is that he succeeded to infect an employee’s home computer. The employee used this home computer to work on corporate documents using his dropbox account. Thus, any modification or new file in the dropbox folder was synchronized to the cloud based folder and then synchronized to the company’s computer. If the attacker succeeds to implement a malware on the home network folder, it will appear and infect the corporate computer.
Thus, using DropSmack, he was able to implement a C&C using dropbox as channel. What is interesting is that it flies below the radar of firewall, IDS or DLP because the synchronized files are encrypted! Furthermore, the likelihood that Dropbox is whitelisted is high. Furthermore, following the statictics presented in my last post, the likelihood that one of your employees is already using Dropbox, even without the blessing of IT department, is extremely high.
Last month, Trendmicro detected a Remote Access Tool using Dropbox as C&C! It was used to target Taiwanese government agency.
A few lessons:
- When a researcher presents an attack, it does not take long to appear in the wild. Never downplay a disclosed attack.
- Cloud brings new threats and we are just seeing the tip of the iceberg. Worst to come.
PS: the same attack may be used on any file sharing service. Dropbox as used due to its popularity and not because it is vulnerable. The vulnerability resides in the concept of (uncontrolled) file sharing.