Security News > 2022 > July > Russian SVR hackers use Google Drive, Dropbox to evade detection
![Russian SVR hackers use Google Drive, Dropbox to evade detection](/static/build/img/news/russian-svr-hackers-use-google-drive-dropbox-to-evade-detection-medium.jpg)
State-backed hackers part of Russia's Federation Foreign Intelligence Service have started using Google Drive legitimate cloud storage service to evade detection.
"We have discovered that their two most recent campaigns leveraged Google Drive cloud storage services for the first time," Unit 42 analysts who spotted the new trend said.
"The ubiquitous nature of Google Drive cloud storage services - combined with the trust that millions of customers worldwide have in them - make their inclusion in this APT's malware delivery process exceptionally concerning."
As Mandiant revealed in an April report tracking one of the group's phishing campaigns, this is not the first time APT29 hackers have abused legitimate web services for command-and-control and storage purposes.
APT29 is the Russian Foreign Intelligence Service hacking division that carried out the SolarWinds supply-chain attack, which led to the compromise of multiple U.S. federal agencies in 2020.
Unit 42 has also recently observed the Brute Ratel adversarial attack simulation tool deployed in attacks suspected to be linked to the Russian SVR cyberspies.
News URL
Related news
- Russian hackers use RDP proxies to steal data in MiTM attacks (source)
- New details reveal how hackers hijacked 35 Google Chrome extensions (source)
- Russian ISP confirms Ukrainian hackers "destroyed" its network (source)
- Hackers use Google Search ads to steal Google Ads accounts (source)
- How Russian hackers went after NGOs’ WhatsApp accounts (source)
- EU sanctions Russian GRU hackers for cyberattacks against Estonia (source)
- Google says hackers abuse Gemini AI to empower their attacks (source)