Ransomware escapes detection using Google Docs

Chinese ransomware uses Google Docs form to share encryption keys

Researchers have discovered a new strain of ransomware that uses Google Docs to avoid detection.

The module - dubbed 'cuteRansomware' - was found by cloud security firm Netskope. It appears to be a Chinese variant of the 'my-Little-Ransomware' package, which was published on GitHub some months ago.

Most of the source code remains unchanged from the original ransomware sample, aside from a few notable alterations.

Firstly, the list of file extensions sought out and encrypted by cuteRansomware was much smaller than the original malware, including .bmp, .png, .jpg, .zip, .txt, .pdf, .pptx, .docx, .py, .cpp, .pcap, .enc, .pem, and .csr files.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

More importantly, however, once infected, the modified ransomware used a Google Docs form to send the attacker the victim's computer's name and the RSA encryption keys used for encrypting their files.

By using Google Docs as a data transmission vector, the attackers can use Google's own security to circumvent the victim's security, the company warned.

"Google Docs uses HTTPS by default and the network data transmission over SSL can easily bypass traditional security solutions such as a firewall, intrusion prevention system, or next generation firewall," Netskope wrote in a blog post. "We believe this is critical."

"As malicious actors make increasing use of the cloud for both delivering malware and exfiltrating data via command-and-control, traditional detection tools' lack of visibility into SSL becomes a huge benefit to them."

Netskope also stated that this could represent the start of a trend towards increasing use of cloud services in amongst malware authors, for controlling botnets as well as conveying information.

The security firm said it has notified Google's own security team of the issue. IT Pro has contacted Google for comment.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019
Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019
Visit/antivirus/28144/best-antivirus
antivirus

Best antivirus for Windows 10

3 Sep 2019

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/security/cyber-security/354468/if-not-passwords-then-what
cyber security

If not passwords then what?

8 Jan 2020
Visit/policy-legislation/31772/gdpr-and-brexit-how-will-one-affect-the-other
Policy & legislation

GDPR and Brexit: How will one affect the other?

9 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020