Rapid Growth of Malware Cloud Apps In The Past Years

Rapid Hike in Malware Cloud Apps

The rise in the use of cloud applications by businesses has not gone unnoticed by cyber attackers, who view these apps as ideal homes to host malware and cause harm. Research conducted by Netskope, a specialist in Secure Access Service Edge (SASE), shows that over 400 distinct cloud applications delivered malware in 2022, nearly triple the amount seen in the prior year.

the Rise of Cloud-Delivered Malware

Findings from Netskope’s Cloud & Threat Report:

Netskope’s Cloud & Threat Report indicates that 30% of all cloud malware downloads in 2022 came from Microsoft OneDrive, with Weebly and GitHub following closely behind at 8.6% and 7.6%, respectively. The report also found that the most significant change in cloud application use in 2022 was the marked increase in the percentage of users uploading content to the cloud, with over 25% of users worldwide uploading documents daily to Microsoft OneDrive. The drastic increase in cloud users across a record number of cloud applications led to a sizable increase in cloud malware downloads in 2022, after remaining close to flat in 2021 compared to 2020.

Increased Use of Cloud Applications in Different Industries and Regions:

The correlation between uploads and downloads among the most popular apps is no coincidence. As industries continue to increase their reliance on cloud applications and cloud infrastructure to support business operations, cloud-delivered malware is becoming a larger threat, especially in certain geographic regions and industries. In 2022, several regions saw significant increases in the overall percentage of cloud-delivered malware compared to 2021, including Australia, Europe, Africa, and Asia. In certain industries, cloud-delivered malware became more predominant globally, especially in the telecom, manufacturing, retail, and healthcare industries.

The Impact of the COVID-19 Pandemic on Cloud Use:

The COVID-19 pandemic and the worldwide shift toward hybrid work have further accelerated the use of cloud applications. The remote and hybrid work dynamics continue to pose multiple cybersecurity challenges, including how to securely provide users with access to company resources and how to scalably and securely provide internet access. According to Netskope data, the ratio of the number of users on the platform to the number of network locations from which the users’ traffic originates is 66%, the same percentage it was at the start of the pandemic over two years ago.

Recommendations for Organizations to Avoid Cloud-Delivered Malware Threats:

Netskope recommends organizations take the following actions to avoid an increased risk of security incidents stemming from cloud- and web-delivered malware:

    • Enforce granular policy controls to limit data flow, including flow to and from apps, between company and personal instances, among users, and to and from the web. Adapt the policies based on device, location, and risk.
    • Deploy multi-layered, inline threat protection for all cloud and web traffic to block inbound malware and outbound malware communications.
    • Enable multi-factor authentication for unmanaged enterprise apps.
Importance of Proactive Approach to Cloud Security:

To mitigate the risk of cloud-delivered malware, organizations must be proactive in their approach to cloud security. Implementing the above recommendations, as well as regularly reviewing and updating their security posture, can help organizations reduce the risk of malware attacks. As the use of cloud applications continues to grow, it is essential for organizations to stay ahead of the curve and take the necessary steps to secure their cloud infrastructure.

The Need for Regular Security Audits and Employee Training:
Moreover, conducting regular security audits and assessments, along with ensuring all employees are properly trained on security best practices, can also help organizations stay protected against cloud-delivered malware. In today’s fast-paced and highly connected world, it is more important than ever for organizations to prioritize their cybersecurity efforts and take the necessary measures to protect their critical assets and information.