Man in the Cloud attack scenario - Persistent Double Switch

This attack is very similar to the Quick Double Switch, but only difference is that the attacker maintains remote access to the victim's machine. This access allows the attacker to interact with the victim’s machine from time to time, execute arbitrary code, and collect that code’s output.

Attack Execution Phase:

  1. The attacker tricks the victim (using phishing or drive-by transfer attacks) or uses an exploit in order to execute the Switcher in victim's device. The Switcher then place the attacker’s synchronization token into the cloud Application.
  2. When this first switch is complete, the Switcher copies the original synchronization token into the synced folder.
  3. Now the Cloud Application syncs with the attacker’s account.
  4. The attacker is now owning the access to victim’s synced folder intern for synchronization token which is placed in the folder by the tool.
  5. The attacker then uses the stolen victim's synchronization token to connect with the victim’s file synchronization account by using the Switcher tool on the his own machine.
  6. The Switcher tool runs for the second time on the victim’s machine restoring the original synchronization token of the victim, essentially restoring the cloud Application to its original state.
  7. After this second switch the attacker sets up remote access to the victim’s computer. The remote access is set up by waiting for a file to show up in a specific location in the sync folder, and then executing that file, There are multiple methods for setting such backdoor like scheduled tasks, setting conditional events through WMI etc.

Once remote access is enabled, the attacker can execute arbitrary code on the victim’s machine by using the following process:

  1. Place the code in a specific location in the sync folder on the attacker’s machine.
  2. The code gets synchronized to the victim’s machine. The backdoor mechanism identifies the new file and executes it.
  3. The output of the code is written to the sync folder on the victim’s machine and is synchronized to the attacker’s machine.
  4. The attacker collects the output, then removes the output and the code.

Here the attacker's use victim’s cloud storage as remote access infrastructure.

Authored by Rajesh Rao

Rate this article: 
Average: 2.7 (6 votes)
Article category: 
Keywords: