Detecting a Google Drive vulnerability could allow hackers to trick users into installing malware
An unresolved security weakness in Google Drive can be exploited by software attackers to distribute malicious files disguised as normal documents or images targeting users, thereby allowing users to allowing them to deploy large-scale phishing attacks with a fairly high rate of success.
With that said, this is a vulnerability that Google has confirmed, but as of now it has not been patched. This vulnerability exists in the "manage versions" function of Google Drive, which is designed to allow users to upload and manage different versions of a file, as well as the interface. latest for users.
Vulnerability on Google Drive
Logically, manage versions will allow Google Drive users to update the old version of the file to the new version with the same extension, but not quite. According to A. Nikoci, a professional system administrator who reported the vulnerability to Google and then revealed the details to The Hacker News, in terms of functionality, the vulnerability in manage versions allows users to upload the latest version of the currently archived files with any extension that does not have the specific resemblance to the original design, even with a malicious executable.
The malicious executable is disguised as an image file
As can be seen in the demo videos Nikoci shared with The Hacker News, the vulnerability could cause the legitimate version of a file that was shared between a group of users to be replaced by a malicious file, which almost there aren't any signs of identification. When users download this file and access it, the malicious code immediately infects the entire system.
Demo video exploits a vulnerability in Google Drive
Apparently this vulnerability opened up new doors for highly effective phishing campaigns, leveraging the popularity of cloud services like Google Drive to spread malware on a large scale, especially. is for organizations and enterprises that use this cloud storage platform to share documents.
Nikoci said it has sent a notice to Google on the issue since August 22. Mountain View company has received the information, but as of now, there are no patches or comments. given.
For now, the best possible limited solutions are to use reliable antivirus software and be wary of file update warnings on Google Drive, especially if you don't know the file's origin.
You should read it
- Phishing attack: The most common techniques used to attack your PC
- Support tools for using documents from Google Drive
- Download files and websites directly from Google Drive in Chrome browser
- New phishing attacks appear to use Google Translate as a disguise
- Don't miss these 9 useful Google Drive tricks!
- [Infographic] How to become a 'power' user of Google Drive
- Summary of useful shortcuts on Google Drive
- 5 interesting features on Google Drive that users do not know
May be interested
- Google has just patched a critical Gmail vulnerability, allowing hackers to send fake emailsgoogle just patched a critical vulnerability affecting gmail and g suite. this vulnerability allows hackers to send fake identity emails to scam users.
- Find bug in Emotet malware, prevent it from spreading for 6 monthsaccording to researcher james quinn of the security firm binary defense, like other software, malicious code also has vulnerabilities, error codes. hackers can exploit software vulnerabilities to cause harm, security experts can also decompile the source code of malicious code to find the vulnerability to exploit and defeat the malicious code.
- Microsoft has just patched a critical security hole in Windows 10 discovered in 2018in patch tuesday released august 2020, microsoft patched a vulnerability that allowed hackers to turn msi files into java files that could spread malicious code on windows 10. and more importantly, malicious files. this harm retains the legal digital signature.
- Google Chrome has a serious zero-day error, and hackers can execute malicious code at its fullestthis vulnerability allows hackers to bypass the content security policy (csp) rules that were released in chrome 73. luckily, google has a patch for this vulnerability now.
- Wsreset tool of Windows 10 Store was used by hackers to bypass anti-virus softwarewsreset.exe is a legitimate debugging tool used by many users to identify problems and reinstall caching in the windows store.
- The Joker malware once again bypassed Google's security, spreading strongly on the Play Storethe joker malware has been around since 2017, but google has so far struggled to detect and stop it.