www.itpro.co.uk
Open in
urlscan Pro
52.222.236.15
Public Scan
Submitted URL: https://dennis.slgnt.eu/optiext/optiextension.dll?ID=cNX8FgUyu_R21NhigdchmN_Uy_A1Uy8oE0tf%2B73TM0bXwNRhDgy9YbzUUPESq_hsS...
Effective URL: https://www.itpro.co.uk/cloud/cloud-security/361958/google-drive-most-malware-downloads-2021
Submission: On February 08 via api from CH — Scanned from DE
Effective URL: https://www.itpro.co.uk/cloud/cloud-security/361958/google-drive-most-malware-downloads-2021
Submission: On February 08 via api from CH — Scanned from DE
Form analysis
3 forms found in the DOMPOST /search
<form action="/search" role="search" method="post" class="polaris__form polaris__search--form"><label for="polaris__search--input" class="polaris__label"></label><input type="search" name="search" value="" id="polaris__search--input"
placeholder="What are you looking for" class="polaris__input polaris__input--search" title="" aria-label=""><button type="submit" class="polaris__button -primary" disabled="" aria-label="Search" title="Search"></button></form>
POST https://dennis.slgnt.eu/optiext/optiextension.dll?ID=MofMeN7jyuGShLcNaQZjt2R0PrNwdl85y9epNKwQKD67qFo2wdgsw249hZyuiJDnRzk5WqgEIoBCgWhEqf&BRANDS_NEWSLETTERIDS=CHP_STD,CLP_STD,ITP_USA,ITP_T20,ITP_TBB&NEWSLETTER_ID=ITP_STD&SUBSCRIBE_SOURCE=web0003itp&BRAND_CODE=ITP
<form
action="https://dennis.slgnt.eu/optiext/optiextension.dll?ID=MofMeN7jyuGShLcNaQZjt2R0PrNwdl85y9epNKwQKD67qFo2wdgsw249hZyuiJDnRzk5WqgEIoBCgWhEqf&BRANDS_NEWSLETTERIDS=CHP_STD,CLP_STD,ITP_USA,ITP_T20,ITP_TBB&NEWSLETTER_ID=ITP_STD&SUBSCRIBE_SOURCE=web0003itp&BRAND_CODE=ITP"
target="signup-frame" role="" method="post" class="polaris__form">
<div class="polaris__newsletter--form">
<div class="polaris__newsletter--headings">
<h3 class="polaris__heading polaris__newsletter--title">Get the IT Pro newsletter</h3>
<h4 class="polaris__heading polaris__newsletter--subtitle">Get the free daily newsletter from IT Pro, delivering the latest news, reviews, insights and case studies</h4>
</div>
<div class="polaris__newsletter--button-group"><label for="polaris__newsletter--input" class="polaris__label"></label><input type="email" name="mail" id="polaris__newsletter--input" placeholder="Your email address"
class="polaris__input polaris__input--email" title="Subscribe" aria-label="Subscribe" value=""><button type="submit" class="polaris__button -primary" aria-label="Subscribe" title="Subscribe">Sign up</button></div>
</div>
</form>
POST https://dennis.slgnt.eu/optiext/optiextension.dll?ID=MofMeN7jyuGShLcNaQZjt2R0PrNwdl85y9epNKwQKD67qFo2wdgsw249hZyuiJDnRzk5WqgEIoBCgWhEqf&BRANDS_NEWSLETTERIDS=CHP_STD,CLP_STD,ITP_USA,ITP_T20,ITP_TBB&NEWSLETTER_ID=ITP_STD&SUBSCRIBE_SOURCE=web0003itp&BRAND_CODE=ITP
<form
action="https://dennis.slgnt.eu/optiext/optiextension.dll?ID=MofMeN7jyuGShLcNaQZjt2R0PrNwdl85y9epNKwQKD67qFo2wdgsw249hZyuiJDnRzk5WqgEIoBCgWhEqf&BRANDS_NEWSLETTERIDS=CHP_STD,CLP_STD,ITP_USA,ITP_T20,ITP_TBB&NEWSLETTER_ID=ITP_STD&SUBSCRIBE_SOURCE=web0003itp&BRAND_CODE=ITP"
target="signup-frame" role="" method="post" class="polaris__form">
<div class="polaris__newsletter--form">
<div class="polaris__newsletter--headings">
<h3 class="polaris__heading polaris__newsletter--title">Get the IT Pro newsletter</h3>
<h4 class="polaris__heading polaris__newsletter--subtitle">Get the free daily newsletter from IT Pro, delivering the latest news, reviews, insights and case studies</h4>
</div>
<div class="polaris__newsletter--button-group"><label for="polaris__newsletter--input" class="polaris__label"></label><input type="email" name="mail" value="" id="polaris__newsletter--input" placeholder="Your email address"
class="polaris__input polaris__input--email" title="Subscribe" aria-label="Subscribe"><button type="submit" class="polaris__button -primary" aria-label="Subscribe" title="Subscribe">Sign up</button></div>
</div>
</form>
Text Content
WE VALUE YOUR PRIVACY We and our partners store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products. With your permission we and our partners may use precise geolocation data and identification through device scanning. You may click to consent to our and our partners’ processing as described above. Alternatively you may access more detailed information and change your preferences before consenting or to refuse consenting. Please note that some processing of your personal data may not require your consent, but you have a right to object to such processing. Your preferences will apply to this website only. You can change your preferences at any time by returning to this site or visit our privacy policy. MORE OPTIONSAGREE Skip to ContentSkip to Footer Menu * Business View all Business * Acquisition * Careers & training * Data & insights * Data protection * Digital transformation * Leadership * Marketing & comms * Policy & legislation * Public sector * VoIP * Cloud View all Cloud * Cloud management * Cloud security * Cloud storage * Hybrid cloud * Infrastructure as a service (IaaS) * Platform as a service (PaaS) * Private cloud * Public cloud * Software as a service (SaaS) * Virtualisation * Hardware View all Hardware * Desktops * Laptops * Mobile phones * Monitors * Printers * Routers * Tablets * Windows Migration * Infrastructure View all Infrastructure * Backup * Broadband * Email providers * Internet * Internet of Things (IoT) * Mobile networks * Networking * Servers * Web hosting * Security View all Security * Software * Antivirus * Cyber attacks * Data breaches * Encryption * Firewalls * Hacking * Malware * Privacy * Ransomware * Unified threat management (UTM) * Software View all Software * Apple iOS * Business apps * Development * Google Android * Google Docs * Linux * Microsoft Office * Microsoft Windows * Open source * Operating systems * Windows Migration * Technology View all Technology * Artificial Intelligence (AI) * Augmented reality (AR) * Blockchain * Cognitive technology * Cryptocurrencies * Machine learning * Neural network * Smart city * Voice assistants * Voice recognition * Resources * .co.uk * .com News * Home * Cloud * cloud security GOOGLE DRIVE ACCOUNTED FOR THE MOST MALWARE DOWNLOADS IN 2021 NETSKOPE RESEARCH MALWARE DOWNLOADED VIA CLOUD APPS IS NOW MORE PREVALENT THAN WEB-DELIVERED MALWARE by: Bobby Hellard 12 Jan 2022 12 Jan 2022 Shutterstock Google Drive accounted for the most malware downloads in 2021, taking the top spot from Microsoft OneDrive. The cloud storage service accounted for 37% of all malicious downloads last year, according to the January edition of Netskope's Cloud and Threat report. * Cloud storage: How secure are Dropbox, Google Drive, iCloud and OneDrive? * How secure is Google Drive? * What is malware? Google Drive took the number one from Microsoft OneDrive, which fell to second place with 20% of recorded malware downloads. Rounding out the top five were SharePoint with 9%, Amazon S3 with 6% and GitHub with 3%. IT Pro contacted Google, Microsoft and Amazon for comment but had not received a response at the time of publication. Netskope, a US-based cyber security provider, noted that cloud storage apps gained even greater adoption in 2021, with 79% of customers analysed using at least one cloud storage app, which is up from 71% in 2020. The number of cloud storage apps in use also rose, with organisations with 500 to 2,000 employees using 39 different cloud storage apps last year. GET THE IT PRO NEWSLETTER GET THE FREE DAILY NEWSLETTER FROM IT PRO, DELIVERING THE LATEST NEWS, REVIEWS, INSIGHTS AND CASE STUDIES Sign up What's more, cloud-delivered malware is now more prevalent than variants are downloaded via the web. In 2021, cloud app malware accounted for 66% of all malware downloads, up from 46% at the start of 2020. Aside from its increasing popularity, there are other reasons why Drive surpassed other services when it came to malware downloads, according to Netskope. For example, the Emotet botnet that used Box to deliver malicious Office document payloads was taken down early in 2021 but ended up inspiring hackers to use Google Drive to share malicious Office documents. "The increasing popularity of cloud apps has given rise to three types of abuse described in this report: attackers trying to gain access to victim cloud apps, attackers abusing cloud apps to deliver malware, and insiders using cloud apps for data exfiltration," Netskope Threat Labs threat research director Ray Canzanese said. "The report serves as a reminder that the same apps that you use for legitimate purposes will be attacked and abused. Locking down cloud apps can help to prevent attackers from infiltrating them, while scanning for incoming threats and outgoing data can help block malware downloads and data exfiltration." * cloud storage * Security * cloud security Share on FacebookShare on TwitterShare on LinkedInShare via Email Featured Resources Oracle’s modern data platform strategy Freedom from manual data management Download now Identity's role in zero trust Zero trust starts with a change in philosophy Watch now Vulnerability and patch management Keep known vulnerabilities out of your IT infrastructure Free Download Busting the myths about SSO Why SSO capability is critical to the success of IAM Free download RECOMMENDED Alkira offers Check Point CloudGuard Security to secure virtual cloud networks Cloud ALKIRA OFFERS CHECK POINT CLOUDGUARD SECURITY TO SECURE VIRTUAL CLOUD NETWORKS 29 Sep 2021 29 Sep 2021 Iboss protects web sessions with remote browser isolation Cloud IBOSS PROTECTS WEB SESSIONS WITH REMOTE BROWSER ISOLATION 16 Aug 2021 16 Aug 2021 Most CISOs worry cloud software flaws aren’t being caught cloud security MOST CISOS WORRY CLOUD SOFTWARE FLAWS AREN’T BEING CAUGHT 7 Jun 2021 7 Jun 2021 MOST POPULAR QNAP users angry after NAS drives are updated to combat DeadBolt ransomware ransomware QNAP users angry after NAS drives are updated to combat DeadBolt ransomware 28 Jan 2022 28 Jan 2022 Canon Image Formula R10 review: Makes scanning a dream peripherals Canon Image Formula R10 review: Makes scanning a dream 19 Jan 2022 19 Jan 2022 How to effectively monetise your apps Sponsored How to effectively monetise your apps 27 Jan 2022 27 Jan 2022 Skip to HeaderSkip to Content * CloudPro * ChannelPro * About us * Contact us * Cookie Policy * Privacy Policy * Accessibility * Privacy Preferences * Do Not Sell My Information GET THE IT PRO NEWSLETTER GET THE FREE DAILY NEWSLETTER FROM IT PRO, DELIVERING THE LATEST NEWS, REVIEWS, INSIGHTS AND CASE STUDIES Sign up ITPro is part of Future plc, an international media group and leading digital publisher. Visit our corporate site www.futurenet.com © Future Publishing Limited, Quay House, The Ambury, Bath BA1 1UA. All rights reserved. England and Wales company registration number 2008885 Follow us on FacebookFollow us on TwitterConnect on LinkedIn