DropSmack - PoC Malware

Ink

Administrator
Thread author
Verified
Jan 8, 2011
22,489
PDF Version : DropSmack: How cloud synchronization services render your corporate firewall worthless or via BlackHat Europe 2013

"The real point is to demonstrate the vulnerability that file synchronization applications represent".




Source : DropSmack: Using Dropbox to steal files and deliver malware

Michael P. Kassner interviews a digital forensic scientist who uses Dropbox to compromise targeted networks — something the bad guys probably figured out as well.

I was perusing the seminar briefing website from this year’s Black Hat EU, fishing for potential article topics, when I came across a briefing note titled “DropSmack: How cloud synchronization services render your corporate firewall worthless.” Feeling a nibble, I read the briefing. Right away, I knew I hooked a keeper:

“The contributions of this presentation are threefold. First, we show how cloud-based synchronization solutions in general, and Dropbox in particular, can be used as a vector for delivering malware to an internal network.”

The other two contributions were as eye-opening:
  • Show how the Dropbox synchronization service can be used as a Command and Control (C2) channel.
  • Demonstrate how functioning malware is able to use Dropbox to smuggle out data from exploited remote computers.
I’d like to introduce Mr. Jacob Williams (@MalwareJake). Jake is a highly skilled pen tester and digital forensic scientist employed by CSR Group. He’s the guy who gave the Black Hat presentation, and he’s the one who is going to cause significant angst among Dropbox users as well as corporate-security types.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top