Reviews, How-to Guides, Technology Explained…

    Subscribe to Updates

    Get the latest news from ALLMEDIAWORD.COM .

    What's Hot

    Genesis debuts V-6 hybrid hypercar concept packing 1,071 hp

    December 4, 2023

    Review: Ford BlueCruise 1.2 includes function, smooths rough edges

    December 4, 2023

    Ahead Of The ‘GTA 6’ Trailer, What The First ‘GTA 5’ Trailer Kept Hidden

    December 2, 2023
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    Reviews, How-to Guides, Technology Explained…Reviews, How-to Guides, Technology Explained…
    Subscribe
    • Home
    • Phones
    • Computers
    • Gaming
    • Internet & Security
    • Smart & Connected Life
    • Auto
    Reviews, How-to Guides, Technology Explained…
    Home ยป Hackers Could Exploit Google Workspace and Cloud Platform for Ransomware Attacks
    Internet & Security

    Hackers Could Exploit Google Workspace and Cloud Platform for Ransomware Attacks

    AllmediawordBy AllmediawordNovember 16, 2023Updated:November 16, 2023No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A set of novel attack techniques has been shown versus Google Workspace and the Google Cloud Platform that might be possibly leveraged by risk actors to perform ransomware, information exfiltration, and password recovery attacks.

    ” Starting from a single compromised machine, risk stars could progress in several ways: they could move to other cloned devices with GCPW installed, gain access to the cloud platform with customized consents, or decrypt locally saved passwords to continue their attack beyond the Google ecosystem,” Martin Zugec, technical options director at Bitdefender, stated in a new report.

    A requirement for these attacks is that the bad star has currently acquired access to a regional machine through other ways, triggering Google to mark the bug as not qualified for repairing “since it’s beyond our risk model and the habits remains in line with Chrome’s practices of saving regional information.”

    Nevertheless, the Romanian cybersecurity firm has cautioned that hazard stars can exploit such spaces to extend a single endpoint compromise to a network-wide breach.

    The attacks, in a nutshell, rely on an organization’s use of Google Credential Provider for Windows (GCPW), which provides both mobile gadget management (MDM) and single sign-on (SSO) abilities.

    This enables administrators to from another location handle and manage Windows devices within their Google Workspace environments, along with enables users to access their Windows gadgets using the very smae qualifications that are utilized to login to their Google accounts.

    GCPW is created to utilize a regional fortunate service account named GOogle Accounts and ID Administration (GAIA) to perfectly help with the procedure in the background by connecting to Google APIs for confirming a user’s credentials during the sign-in action and keeping a refresh token to anticipate the need for re-authentication.

    With this setup in location, an assaulter with access to a compromised device can extract an account’s refresh OAuth tokens, either from the Windows pc registry or from the user’s Chrome profile directory site, and bypass multi-factor authentication (MFA) protections.

    The refresh token is subsequently made use of to build an HTTP POST demand to the endpoint “https://www.googleapis [] com/oauth2/v4/ token” to acquire an access token, which, in turn, can be abused to obtain, control, or erase delicate data related to the Google Account.

    A second make use of issues what’s called tje Golden Image lateral movement, which concentrates on virtual device (VM) deployments and makes the most of the truth that producing a machine by cloning another device with pre-installed GCPW triggers the password connected with the GAIA account to be cloned also.

    ” If you understand the password to a local account, and local accounts on all machines share the same password, then you understand the passwords to all devices,” Zugec described.

    ” This shared-password obstacle is comparable to having the very same regional administrator password on all machines that has actually been dealt with by Microsoft’s Local Administrator Password Solution (LAPS).”.

    The 3rd attack requires access to plaintext credentials by leveraging the access token acquired using the abovementioned method to send an HTTP GET request to an undocumented API endpoint and get hold of the private RSA key that is needed to decrypt the password field.

    ” Having access to plaintext qualifications, such as usernames and passwords, represents a more serious threat,” Zugec said. “This is due to the fact that it makes it possible for attackers to directly impersonate legitimate users and gain unlimited access to their accounts, possibly leading to complete account takeover.”.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Allmediaword
    • Website

    Related Posts

    Reptar: New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments

    November 16, 2023

    U.S. Takes Down IPStorm Botnet, Russian-Moldovan Mastermind Pleads Guilty

    November 16, 2023

    Among Apple’s Privacy Features Has ‘Never Ever Worked’

    November 15, 2023

    Comments are closed.

    Advertisment
    Our Picks
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss

    Genesis debuts V-6 hybrid hypercar concept packing 1,071 hp

    Auto December 4, 2023

    Genesis is the current in a long line of car manufacturers to reveal an idea…

    Review: Ford BlueCruise 1.2 includes function, smooths rough edges

    December 4, 2023

    Ahead Of The ‘GTA 6’ Trailer, What The First ‘GTA 5’ Trailer Kept Hidden

    December 2, 2023

    Beginning $60,990, Tesla’s Cybertruck is priced 50% higher than initial quote

    December 1, 2023

    Subscribe to Updates

    Get the latest news from ALLMEDIAWORD.COM .

    About Us
    About Us

    Allmediaword.com makes tech easy for you. From how-to guides, reviews, and tech-explained to product specs, we have you covered. Read now.

    Our Picks
    Facebook Twitter Instagram Pinterest
    • DMCA
    • Terms and Conditions
    • Privacy Policy
    • Cookie Privacy Policy
    © 2023 ALLMEDIAWORD. Designed by ALLMEDIAWORD.

    Type above and press Enter to search. Press Esc to cancel.