Website
drive.google.com
Tags
Phishing Download Exfiltration
Phishing
Attackers have hosted malware on drive.google.com and utilized the sharing capabilities and phish users to download it.
Command and Control
Attackers have used drive.google.com for C&C by retrieving files with commands to be executed. An example of a malware that uses drive.google.com as C&C is SysJoker.
Exfiltration
drive.google.com can be used to store exfiltrated files on there. GC2 is an open-source tool that utilizes drive.google.com for exfiltration.
Download
drive.google.com creates shared links for files which enables attackers to download additional tools.
Service Provider
Google
Created: 2021-11-10
Last Update: 2021-11-10
Credits: mr.d0x