www.itpro.co.uk Open in urlscan Pro
52.222.236.15  Public Scan

Submitted URL: https://dennis.slgnt.eu/optiext/optiextension.dll?ID=cNX8FgUyu_R21NhigdchmN_Uy_A1Uy8oE0tf%2B73TM0bXwNRhDgy9YbzUUPESq_hsS...
Effective URL: https://www.itpro.co.uk/cloud/cloud-security/361958/google-drive-most-malware-downloads-2021
Submission: On February 08 via api from CH — Scanned from DE

Form analysis 3 forms found in the DOM

POST /search

<form action="/search" role="search" method="post" class="polaris__form polaris__search--form"><label for="polaris__search--input" class="polaris__label"></label><input type="search" name="search" value="" id="polaris__search--input"
    placeholder="What are you looking for" class="polaris__input polaris__input--search" title="" aria-label=""><button type="submit" class="polaris__button -primary" disabled="" aria-label="Search" title="Search"></button></form>

POST https://dennis.slgnt.eu/optiext/optiextension.dll?ID=MofMeN7jyuGShLcNaQZjt2R0PrNwdl85y9epNKwQKD67qFo2wdgsw249hZyuiJDnRzk5WqgEIoBCgWhEqf&BRANDS_NEWSLETTERIDS=CHP_STD,CLP_STD,ITP_USA,ITP_T20,ITP_TBB&NEWSLETTER_ID=ITP_STD&SUBSCRIBE_SOURCE=web0003itp&BRAND_CODE=ITP

<form
  action="https://dennis.slgnt.eu/optiext/optiextension.dll?ID=MofMeN7jyuGShLcNaQZjt2R0PrNwdl85y9epNKwQKD67qFo2wdgsw249hZyuiJDnRzk5WqgEIoBCgWhEqf&amp;BRANDS_NEWSLETTERIDS=CHP_STD,CLP_STD,ITP_USA,ITP_T20,ITP_TBB&amp;NEWSLETTER_ID=ITP_STD&amp;SUBSCRIBE_SOURCE=web0003itp&amp;BRAND_CODE=ITP"
  target="signup-frame" role="" method="post" class="polaris__form">
  <div class="polaris__newsletter--form">
    <div class="polaris__newsletter--headings">
      <h3 class="polaris__heading polaris__newsletter--title">Get the IT Pro newsletter</h3>
      <h4 class="polaris__heading polaris__newsletter--subtitle">Get the free daily newsletter from IT Pro, delivering the latest news, reviews, insights and case studies</h4>
    </div>
    <div class="polaris__newsletter--button-group"><label for="polaris__newsletter--input" class="polaris__label"></label><input type="email" name="mail" id="polaris__newsletter--input" placeholder="Your email address"
        class="polaris__input polaris__input--email" title="Subscribe" aria-label="Subscribe" value=""><button type="submit" class="polaris__button -primary" aria-label="Subscribe" title="Subscribe">Sign up</button></div>
  </div>
</form>

POST https://dennis.slgnt.eu/optiext/optiextension.dll?ID=MofMeN7jyuGShLcNaQZjt2R0PrNwdl85y9epNKwQKD67qFo2wdgsw249hZyuiJDnRzk5WqgEIoBCgWhEqf&BRANDS_NEWSLETTERIDS=CHP_STD,CLP_STD,ITP_USA,ITP_T20,ITP_TBB&NEWSLETTER_ID=ITP_STD&SUBSCRIBE_SOURCE=web0003itp&BRAND_CODE=ITP

<form
  action="https://dennis.slgnt.eu/optiext/optiextension.dll?ID=MofMeN7jyuGShLcNaQZjt2R0PrNwdl85y9epNKwQKD67qFo2wdgsw249hZyuiJDnRzk5WqgEIoBCgWhEqf&amp;BRANDS_NEWSLETTERIDS=CHP_STD,CLP_STD,ITP_USA,ITP_T20,ITP_TBB&amp;NEWSLETTER_ID=ITP_STD&amp;SUBSCRIBE_SOURCE=web0003itp&amp;BRAND_CODE=ITP"
  target="signup-frame" role="" method="post" class="polaris__form">
  <div class="polaris__newsletter--form">
    <div class="polaris__newsletter--headings">
      <h3 class="polaris__heading polaris__newsletter--title">Get the IT Pro newsletter</h3>
      <h4 class="polaris__heading polaris__newsletter--subtitle">Get the free daily newsletter from IT Pro, delivering the latest news, reviews, insights and case studies</h4>
    </div>
    <div class="polaris__newsletter--button-group"><label for="polaris__newsletter--input" class="polaris__label"></label><input type="email" name="mail" value="" id="polaris__newsletter--input" placeholder="Your email address"
        class="polaris__input polaris__input--email" title="Subscribe" aria-label="Subscribe"><button type="submit" class="polaris__button -primary" aria-label="Subscribe" title="Subscribe">Sign up</button></div>
  </div>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products.
With your permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may access more
detailed information and change your preferences before consenting or to refuse
consenting.
Please note that some processing of your personal data may not require your
consent, but you have a right to object to such processing. Your preferences
will apply to this website only. You can change your preferences at any time by
returning to this site or visit our privacy policy.
MORE OPTIONSAGREE
Skip to ContentSkip to Footer
Menu
 * Business
   
   View all Business
   
    * Acquisition
    * Careers & training
    * Data & insights
    * Data protection
    * Digital transformation
    * Leadership
    * Marketing & comms
    * Policy & legislation
    * Public sector
    * VoIP

 * Cloud
   
   View all Cloud
   
    * Cloud management
    * Cloud security
    * Cloud storage
    * Hybrid cloud
    * Infrastructure as a service (IaaS)
    * Platform as a service (PaaS)
    * Private cloud
    * Public cloud
    * Software as a service (SaaS)
    * Virtualisation

 * Hardware
   
   View all Hardware
   
    * Desktops
    * Laptops
    * Mobile phones
    * Monitors
    * Printers
    * Routers
    * Tablets
    * Windows Migration

 * Infrastructure
   
   View all Infrastructure
   
    * Backup
    * Broadband
    * Email providers
    * Internet
    * Internet of Things (IoT)
    * Mobile networks
    * Networking
    * Servers
    * Web hosting

 * Security
   
   View all Security
   
    * Software
    * Antivirus
    * Cyber attacks
    * Data breaches
    * Encryption
    * Firewalls
    * Hacking
    * Malware
    * Privacy
    * Ransomware
    * Unified threat management (UTM)

 * Software
   
   View all Software
   
    * Apple iOS
    * Business apps
    * Development
    * Google Android
    * Google Docs
    * Linux
    * Microsoft Office
    * Microsoft Windows
    * Open source
    * Operating systems
    * Windows Migration

 * Technology
   
   View all Technology
   
    * Artificial Intelligence (AI)
    * Augmented reality (AR)
    * Blockchain
    * Cognitive technology
    * Cryptocurrencies
    * Machine learning
    * Neural network
    * Smart city
    * Voice assistants
    * Voice recognition

 * Resources
 * .co.uk
    * .com







News
 * Home
 * Cloud
 * cloud security


GOOGLE DRIVE ACCOUNTED FOR THE MOST MALWARE DOWNLOADS IN 2021


NETSKOPE RESEARCH MALWARE DOWNLOADED VIA CLOUD APPS IS NOW MORE PREVALENT THAN
WEB-DELIVERED MALWARE

by: Bobby Hellard
12 Jan 2022
12 Jan 2022

Shutterstock

Google Drive accounted for the most malware downloads in 2021, taking the top
spot from Microsoft OneDrive.

The cloud storage service accounted for 37% of all malicious downloads last
year, according to the January edition of Netskope's Cloud and Threat report. 

 * Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive?
 * How secure is Google Drive?
 * What is malware?

Google Drive took the number one from Microsoft OneDrive, which fell to second
place with 20% of recorded malware downloads. Rounding out the top five were
SharePoint with 9%, Amazon S3 with 6% and GitHub with 3%.



IT Pro contacted Google, Microsoft and Amazon for comment but had not received a
response at the time of publication. 

Netskope, a US-based cyber security provider, noted that cloud storage apps
gained even greater adoption in 2021, with 79% of customers analysed using at
least one cloud storage app, which is up from 71% in 2020. The number of cloud
storage apps in use also rose, with organisations with 500 to 2,000 employees
using 39 different cloud storage apps last year.


GET THE IT PRO NEWSLETTER

GET THE FREE DAILY NEWSLETTER FROM IT PRO, DELIVERING THE LATEST NEWS, REVIEWS,
INSIGHTS AND CASE STUDIES

Sign up


What's more, cloud-delivered malware is now more prevalent than variants are
downloaded via the web. In 2021, cloud app malware accounted for 66% of all
malware downloads, up from 46% at the start of 2020. 

Aside from its increasing popularity, there are other reasons why Drive
surpassed other services when it came to malware downloads, according to
Netskope. For example, the Emotet botnet that used Box to deliver malicious
Office document payloads was taken down early in 2021 but ended up inspiring
hackers to use Google Drive to share malicious Office documents.





"The increasing popularity of cloud apps has given rise to three types of abuse
described in this report: attackers trying to gain access to victim cloud apps,
attackers abusing cloud apps to deliver malware, and insiders using cloud apps
for data exfiltration," Netskope Threat Labs threat research director Ray
Canzanese said. 

"The report serves as a reminder that the same apps that you use for legitimate
purposes will be attacked and abused. Locking down cloud apps can help to
prevent attackers from infiltrating them, while scanning for incoming threats
and outgoing data can help block malware downloads and data exfiltration."


 * cloud storage
 * Security
 * cloud security

Share on FacebookShare on TwitterShare on LinkedInShare via Email
Featured Resources

Oracle’s modern data platform strategy

Freedom from manual data management

Download now

Identity's role in zero trust

Zero trust starts with a change in philosophy

Watch now

Vulnerability and patch management

Keep known vulnerabilities out of your IT infrastructure

Free Download

Busting the myths about SSO

Why SSO capability is critical to the success of IAM

Free download



RECOMMENDED

Alkira offers Check Point CloudGuard Security to secure virtual cloud networks

Cloud

ALKIRA OFFERS CHECK POINT CLOUDGUARD SECURITY TO SECURE VIRTUAL CLOUD NETWORKS

29 Sep 2021
29 Sep 2021
Iboss protects web sessions with remote browser isolation

Cloud

IBOSS PROTECTS WEB SESSIONS WITH REMOTE BROWSER ISOLATION

16 Aug 2021
16 Aug 2021
Most CISOs worry cloud software flaws aren’t being caught

cloud security

MOST CISOS WORRY CLOUD SOFTWARE FLAWS AREN’T BEING CAUGHT

7 Jun 2021
7 Jun 2021

MOST POPULAR

QNAP users angry after NAS drives are updated to combat DeadBolt ransomware

ransomware

QNAP users angry after NAS drives are updated to combat DeadBolt ransomware

28 Jan 2022
28 Jan 2022
Canon Image Formula R10 review: Makes scanning a dream

peripherals

Canon Image Formula R10 review: Makes scanning a dream

19 Jan 2022
19 Jan 2022
How to effectively monetise your apps

Sponsored

How to effectively monetise your apps

27 Jan 2022
27 Jan 2022

Skip to HeaderSkip to Content
 * CloudPro
 * ChannelPro
 * About us
 * Contact us
 * Cookie Policy
 * Privacy Policy
 * Accessibility
 * Privacy Preferences
 * Do Not Sell My Information


GET THE IT PRO NEWSLETTER

GET THE FREE DAILY NEWSLETTER FROM IT PRO, DELIVERING THE LATEST NEWS, REVIEWS,
INSIGHTS AND CASE STUDIES

Sign up


ITPro is part of Future plc, an international media group and leading digital
publisher. Visit our corporate site www.futurenet.com
© Future Publishing Limited, Quay House, The Ambury, Bath BA1 1UA. All rights
reserved. England and Wales company registration number 2008885


Follow us on FacebookFollow us on TwitterConnect on LinkedIn