·WOW Internet and..
|
Dropbox and Similar Services Can Sync MalwareMIT Technology Reviewquote: Dropbox and similar services have exploded in popularity in recent years because users find it so convenient to simply drag files to an icon that puts that data in the cloud, shares it with others, and automatically syncs new versions across multiple devices.
But ease of use and insecurity often go hand in hand, and now researchers are revealing an uncomfortable truth: if a computer with Dropbox functionality is compromised, the synching feature allows any malware installed by the attacker to reach other machines and networks using the service.
Stuff like this is why many of us avoid the cloud. It's good in theory, but you're still at the mercy of those nifty features. |
|
StuartMWWho Is John Galt? Premium Member join:2000-08-06 Galt's Gulch kudos:3 |
StuartMW
Premium Member
2013-Aug-25 5:18 pm
I do use Dropbox occasionally to share files. That said I only upload/download via their webpage (no installed software on my boxes). Also the files I share aren't personal data (mine or others). |
|
BlackbirdBuilt for Speed Premium Member join:2005-01-14 Fort Wayne, IN kudos:4 |
to goalieskates
It's like druggies sharing needles. Folks used to share floppies and get cross-infected... now they can share files across the cloud - with similar results. The rule of thumb is still: user beware. |
|
Mele20 Premium Member join:2001-06-05 Hilo, HI kudos:8 |
to goalieskates
So, what's it going to be like with Windows 8.1 where Skydrive is totally integrated into the OS? Even if you never set up a Microsoft account for signin, and use only a local account, you still have Skydrive and it cannot be uninstalled. Will this create vulnerabilities? I've read that in 8.1 the ONLY way to access Windows Store is via a Microsoft account signin which automatically turns on default settings for Skydrive. |
|
DocDrewaka DrDrew Premium Member join:2009-01-28 SoCal kudos:22 ARRIS TG1672 ARRIS SB6141 Linksys EA6900
|
to goalieskates
The standard is to have your A/V scan what ever files are accessible by your PC. Has that changed? Files from the internet are scanned, floppies are scanned, thumb drives are scanned, etc. Is this any different?
Someone's trying to make a mountain of a molehill. |
|
Snowy Premium Member join:2003-04-05 Kailua, HI kudos:6 ·Hawaiian Telcom
·Clearwire Wireless
·Time Warner Cable
|
Snowy
Premium Member
2013-Aug-25 9:00 pm
The importance of a new attack vector is determined by the amount of vulnerable machines it covers. An attack vector that's as widely distributed by Dropbox et al isn't a molehill, IMO.
Anyway, that's a huge leap of faith you place on your AV. |
|
DocDrewaka DrDrew Premium Member join:2009-01-28 SoCal kudos:22 ARRIS TG1672 ARRIS SB6141 Linksys EA6900
|
DocDrew
Premium Member
2013-Aug-25 10:05 pm
I have to have some faith in my a/v. It's been scanning work and school network shares for the last 10 years. It was scanning email attachments and portable drives for years before that.
It happened to catch 3 viruses on a thumb drive somebody wanted files on just last week. The last virus I caught was a network infection of Nimda...
Dropbox is just another way to share files and any new few should be scanned. |
|
Snowy Premium Member join:2003-04-05 Kailua, HI kudos:6 ·Hawaiian Telcom
·Clearwire Wireless
·Time Warner Cable
|
Snowy
Premium Member
2013-Aug-25 10:35 pm
said by DocDrew:I have to have some faith in my a/v. Yes, running an up to date real time protection AV is better than not running one. My point was that in a battle of malware vs AV, the malware is going to win a few. Since this particular attack vector doesn't require a user to actively download the malware it takes your knowledge of what's been downloaded to your machine out of the equation. This attack vector still requires the user to run the malware which is it's weak point but even at that I wouldn't call it a molehill attack just because of the sheer number of potential victim machines. |
|
DocDrewaka DrDrew Premium Member join:2009-01-28 SoCal kudos:22 ARRIS TG1672 ARRIS SB6141 Linksys EA6900
|
DocDrew
Premium Member
2013-Aug-25 11:33 pm
My point is this isn't a new attack vector. Network attached storage and shared drives that auto sync between multiple users have been around for many years. They are very common in school and work settings. Most A/Vs handle them just fine.
With the internet and media rich web pages most people don't realize or have knowledge of most of the files downloaded to their machines anyway, tons of stuff winds up in caches, temp files, memory, and other locations all over the average PC but the A/Vs scan the majority of it as it comes in by default. |
|
Snowy Premium Member join:2003-04-05 Kailua, HI kudos:6 ·Hawaiian Telcom
·Clearwire Wireless
·Time Warner Cable
|
Snowy
Premium Member
2013-Aug-25 11:54 pm
The exploit isn't talking about "caches, temp files, memory,etc..., areas that wouldn't normally be accessed by a user. Presumably, were talking about a Dropbox etc... folder that would be accessed in the normal course of daily activity.
It's not lost on me that you're confident of your defensive strategy but an analysis of the exploit needs to look at the larger picture before claiming it's a molehill. |
|
| |
to goalieskates
i don't know about "dropbox" but i think that google-chrome's "sync" IS a problem.. |
|
|
norwegian Premium Member join:2005-02-15 Outback kudos:1 |
to goalieskates
A sync function wouldn't be any different if it is in the cloud or in the network I would think. Auto-sync would make it one more step closer. The cloud also accesses a web page or utilizes port 80 or what ever port the tool utilizes, theoretically allowing extra concerns, it is not an internal protected network, nor a VPN etc, at least for the general user.
Everyone says a layered security approach helps security, so the oppisite allowing more doors to sync between computers would erode such security if the correct precautions weren't adhered to.
Does a cloud provider have to scan all the traffic it transmits for the end-user/s? I'd think not, it would be like asking the ISP to filter all your internet traffic.
If I share a file, I generally pass on the link, confirm it is downloaded and then delete the link via a file share site, or just delete it after a week or use a site that deletes after a week for resource reasons. Nothing would stop me from sending a malware to another person if in a password zipped file, or enough to stop A/V scanners from accessing it.
If an exploit wanted to have code specific to a sync function I can't see it being that much different to any other malware, just specific to it's design.
If the cloud host became infected, I would think sync would create a concern, but so would an infected ad or web site. I'm just having a hard time understanding why this is different to any other network already in place, in general layman's terms, maybe someone can help with specifics? |
|
Ian Premium Member join:2002-06-18 ON kudos:4 |
to goalieskates
I don't really see what's new here.
Yes, accessing a file with multiple users to multiple PCs can spread malware. Hardly news, and always a reason to be careful when doing so.
But this was accomplished easily enough long before the "cloud". I remember the company I was with getting the "I Love You Virus". Enough nitwits clicked on the attachment over Msmail that it ground our network to a a halt and took hours to clean up. |
|
therube join:2004-11-11 Randallstown, MD ·Xfinity
·Verizon Online DSL
2 edits |
to goalieskates
I don't quite follow? > if a computer with Dropbox functionality is compromised, the synching feature > allows any malware installed by the attacker to reach other machines and > networks using the service OK. So are we to expect different? And if you have a Windows computer, most likely Windows has made a backup of this same malware, stored in System Restore. And if you restore your system, guess what. So. > many of us avoid the cloud And just what is the "cloud". Lets expand the cloud to THE INTERNET. Well, golly gee, if you disconnect a computer from the Internet... The "clould" isn't some magical place where bad stuff takes place. It isn't like you can use the Internet, safely, without fear, but the, oh, "cloud" you had better watch out for. The "cloud" had to get its bad stuff from somewhere. It doesn't just drop from the, clouds. It's the Internet. You use it, I use it. So a firm uses a service that allows traffic through its firewalls. And that traffic is what? Can do what? Is it unexpected that if you allow something... I'm about to post this message, on the Internet, or in the cloud, if you will, & if I were able to do something malicious with this post, & you opened, read this post, well guess what. quote: The Wizard is ... the ruler of the Land ... highly venerated ... the only man capable of solving their problems ... the Wizard appears in a different form ... as a giant head ... as a beautiful fairy ... as a ball of fire ... as a horrible monster ... a disembodied voice.
Eventually, it is revealed that Oz is actually none of these things, but rather a kind, ordinary man from Omaha, Nebraska, who has been using a lot of elaborate magic tricks and props to make himself seem "great and powerful".
Oh, & from my take on the article, it is not like having malware in "the cloud" automatically causes it to infect all other users of the cloud, it only has the possibility to infect those who access the shared files. So because I have malware in my dropbox, it is contained to me & those who may access my share. And if I have not shared it, then it is contained to me, solely. (Now if I uploaded malware & it propagated to ALL other dropbox users, that is an entirely different situation.) |
|
StuartMWWho Is John Galt? Premium Member join:2000-08-06 Galt's Gulch kudos:3 |
StuartMW
Premium Member
2013-Aug-26 10:48 am
said by therube:The "clould" isn't some magical place where bad stuff takes place. Or good. The issue, IMO, is the marketing surrounding "the cloud". Most people, including many in marketing, have no idea what "the cloud" is. Then again if you tell them it's a bunch of geographically dispersed servers that appear as one they don't understand that either. IMO the bigger issue is the whole idea that one should upload and store all their personal data online. Sooner or later one is going to regret doing that. However since we live in an age where "convenience" is king (trumps security and privacy) the ability to automatically sync devices is a must have for many. |
|
norwegian Premium Member join:2005-02-15 Outback kudos:1 |
to goalieskates
Dropbox: Prepare to lose ASLRI've just come across this and thought it worth adding to this discussion. » codeinsecurity.wordpress ··· gnId=793Notice that the Dropbox extension DLL doesnt have the ASLR flag set. This means that any vulnerability in Firefox becomes a lot easier to exploit, since the Dropbox module provides an unrandomised anchor for a ROP chain. Ignore PowerHookMenu.dll here Im aware of that issue and have notified the developer, but its infrequently seen on peoples machines so its not so bad. ASLR: » en.wikipedia.org/wiki/Ad ··· mization» www.microsoft.com/securi ··· tion_3_3Very interesting comments when added to the question of sync as well. Anyone using Dropbox may want to deploy EMET or similar to help protect themselves if they have to run the software. |
|
dib22 join:2002-01-27 Kansas City, MO |
to therube
Re: Dropbox and Similar Services Can Sync Malwaresaid by therube:The "clould" isn't some magical place where bad stuff takes place. You are making the marketing people who invented the cloud cry  |
|