Detecting a Google Drive vulnerability could allow hackers to trick users into installing malware
An unresolved security weakness in Google Drive can be exploited by software attackers to distribute malicious files disguised as normal documents or images targeting users, thereby allowing users to allowing them to deploy large-scale phishing attacks with a fairly high rate of success.
With that said, this is a vulnerability that Google has confirmed, but as of now it has not been patched. This vulnerability exists in the "manage versions" function of Google Drive, which is designed to allow users to upload and manage different versions of a file, as well as the interface. latest for users.
Vulnerability on Google Drive
Logically, manage versions will allow Google Drive users to update the old version of the file to the new version with the same extension, but not quite. According to A. Nikoci, a professional system administrator who reported the vulnerability to Google and then revealed the details to The Hacker News, in terms of functionality, the vulnerability in manage versions allows users to upload the latest version of the currently archived files with any extension that does not have the specific resemblance to the original design, even with a malicious executable.
The malicious executable is disguised as an image file
As can be seen in the demo videos Nikoci shared with The Hacker News, the vulnerability could cause the legitimate version of a file that was shared between a group of users to be replaced by a malicious file, which almost there aren't any signs of identification. When users download this file and access it, the malicious code immediately infects the entire system.
Demo video exploits a vulnerability in Google Drive
Apparently this vulnerability opened up new doors for highly effective phishing campaigns, leveraging the popularity of cloud services like Google Drive to spread malware on a large scale, especially. is for organizations and enterprises that use this cloud storage platform to share documents.
Nikoci said it has sent a notice to Google on the issue since August 22. Mountain View company has received the information, but as of now, there are no patches or comments. given.
For now, the best possible limited solutions are to use reliable antivirus software and be wary of file update warnings on Google Drive, especially if you don't know the file's origin.
You should read it
- Google Drive 4,2021.46200, Download Google Drive here
- New malware uses Google Drive as a command-and-control server
- Phishing attack: The most common techniques used to attack your PC
- Support tools for using documents from Google Drive
- Download files and websites directly from Google Drive in Chrome browser
- New phishing attacks appear to use Google Translate as a disguise
- Don't miss these 9 useful Google Drive tricks!
- [Infographic] How to become a 'power' user of Google Drive
- Summary of useful shortcuts on Google Drive
- 5 interesting features on Google Drive that users do not know
- How to use Google Drive like free FTP server or Network Drive
- Restore, retrieve deleted data on Google Drive
Maybe you are interested
How to Share Your Exact Location with Google Plus Codes
How to change the default font in Google Docs - Use the font of choice
Manifest V3 rollout to remove Google extensions is being pushed
More than 200 apps containing malicious code were discovered and downloaded millions of times on the Google Play Store.
How to Use Google Drive with Android File Manager
Kaspersky antivirus software suddenly disappears from Google Play Store