Attackers today aren’t just launching brute-force attempts or crafting custom malware, they’re getting smarter and more deceptive. Rather than relying solely on traditional methods, modern threat actors are increasingly abusing legitimate cloud services, the very platforms businesses and users trust daily, to deliver malware, exfiltrate data, and establish command-and-control (C2) channels.
This approach is especially dangerous because it allows attackers to blend into regular traffic, bypassing many conventional defenses organizations depend on.
This tactic involves leveraging widely well-known, trusted platforms, such as Google Drive, OneDrive, Dropbox, GitHub, Discord, Telegram, Notion, and Google Apps Script for malicious purposes. Here’s how these services are being weaponized:
Since these services are often whitelisted in enterprise environments, attackers can operate quietly without triggering alerts.
MITRE ATT&CK:
T1566.002 – Spearphishing LinkT1071.001 – Web Protocols
Campaign Overview:
Associated Threat Groups: FIN7, STORM-0408, SocGholish
T1027 – Obfuscated Files or InformationT1116 – Code Signing
To counter these stealthy threats, organizations must look beyond domain-based trust and focus on contextual detection. Here are some defensive strategies:
As cybercriminals grow bolder and more creative, they’re increasingly turning the tools we trust into their own arsenal. Security teams can no longer afford to rely solely on signatures or domain-based filters. We must analyze behavior, monitor context, and remain suspicious, even when the source seems familiar.
The next major breach won’t come from the dark web, it may come from your trusted cloud drive.
Enjoyed reading this blog? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy