Google Drive emerges as top app for malware downloads

Netskope published a research which found that phishing downloads saw a sharp increase of 450% over the past 12 months, fueled by attackers using search engine optimization (SEO) techniques to improve the ranking of malicious PDF files on popular search engines, including Google and Bing.

malicious PDF search engines

The top web referrer categories contained some categories traditionally associated with malware, particularly shareware/freeware, but were dominated by more unconventional categories. The ascension of the use of search engines to deliver malware over the past 12 months provides insight into how adept some attackers have become at SEO. Malware downloads referred by search engines were predominantly malicious PDF files, including many malicious fake CAPTCHAs that redirected users to phishing, spam, scam, and malware websites.

The report also found that most malware over the past 12 months was downloaded from within the same region as its victim, a growing trend that points to the increasing sophistication of cybercriminals, which more frequently stage malware to avoid geofencing filters and other traditional prevention measures.

The findings reveal that attackers tend to target victims located in a specific region with malware hosted within the same region. In most regions, the plurality of malware downloads originated from the same region as the victim. This is especially true for North America, where 84% of all malware downloads by victims in North America were downloaded from websites hosted in North America.

“Malware is no longer confined to traditional risky web categories. It is now lurking everywhere, from cloud apps to search engines, leaving organizations at greater risk than ever before,” said Ray Canzanese, Threat Research Director at Netskope. “To avoid falling victim to these social engineering techniques and targeted attack methods, security leaders must regularly revisit their malware protection strategy and ensure all possible entry points are accounted for.”

Additional key findings

  • Trojans continue to prove effective: Trojans account for 78% of all cloud and web malware downloads as attackers use social engineering techniques to gain an initial foothold and to deliver a variety of next-stage payloads, including backdoors, infostealers, and ransomware. There is no single family of Trojans that is globally dominant. The top 10 Trojan families account for only 14% of all downloads, with the remaining 86% coming from less common families.
  • Cloud and web are an attacker’s perfect pair: 47% of malware downloads originate from cloud apps compared to 53% from traditional websites, as attackers continue to use a combination of both cloud and web to target their victims.
  • Popular cloud storage apps continue to be the source of most cloud malware downloads. Additional top cloud app referrers included collaboration and webmail apps, where attackers can send messages directly to their victims in many different forms, including emails, direct messages, comments and document shares.
  • Microsoft Office malware files have declined to pre-emotet levels: EXE and DLL files account for nearly half of all malware downloads as attackers continue to target Microsoft Windows, while malicious Microsoft Office files are on the decline and have returned to pre-Emotet levels. This is due in large part to the past year’s worth of proactive warnings and security controls introduced by technology vendors like Google and Microsoft.



Share this