Cloud File-Sharing Sites Targeted for Corporate Data Theft Attacks

Related

CISOs to Watch in German Manufacturing

Germany’s manufacturing sector is highly diversified, spanning chemicals, pharmaceuticals,...

CISOs to Watch in German Automotive

Germany’s automotive industry is at the forefront of electrification,...

CISO Diaries: Andrew Wilder on Building Cyber Maturity at Scale

Cybersecurity leadership often looks decisive from the outside, but...

CISOs to Watch in Canadian Manufacturing

Canada’s manufacturing sector spans aerospace, automotive, food production, forestry,...

CISOs to Watch in Canadian Mining & Natural Resources

Canada’s mining and natural resources sector is a global...

Share

What happened

Threat actors are targeting cloud file-sharing platforms ShareFile, Nextcloud, and OwnCloud to steal sensitive corporate data. According to analysis from Hudson Rock, attackers obtain valid credentials using infostealer malware such as RedLine, Lumma, and Vidar, then use those credentials to access corporate cloud storage where MFA is not enforced. Stolen data includes government contracts, ERP source code, engineering documents, healthcare records, and defense-related files. The attackers act as initial access brokers, reselling compromised access to other threat actors.

Who is affected

Organizations using ShareFile, Nextcloud, or OwnCloud without enforced MFA and strong credential hygiene are at elevated risk.

Why CISOs should care

Credential-based cloud compromise can result in silent, large-scale data exfiltration without triggering perimeter defenses.

3 practical actions

1. Enforce MFA everywhere: Require multi-factor authentication for all cloud file-sharing platforms.

2. Monitor credential exposure: Track leaked credentials and force password rotation when exposure is detected.

3. Reduce infostealer risk: Strengthen phishing defenses and endpoint protection against credential-stealing malware.