Cloud File-Sharing Sites Targeted for Corporate Data Theft Attacks

Related

CISOs to Watch in Canadian Manufacturing

Canada’s manufacturing sector spans aerospace, automotive, food production, forestry,...

CISOs to Watch in Canadian Mining & Natural Resources

Canada’s mining and natural resources sector is a global...

CISOs to Watch in Canadian Energy & Utilities

Canada’s energy and utilities sector underpins national resilience, economic...

VoiceRun’s $5.5M Seed Round Signals Enterprise Voice AI Maturation

What happened VoiceRun, a Cambridge, Massachusetts–based startup offering a code‑first...

Pax8 Email Error Exposes MSP Partner Licensing and Customer Lists

What happened A Pax8 email error exposes MSP partner licensing...

Share

What happened

Threat actors are targeting cloud file-sharing platforms ShareFile, Nextcloud, and OwnCloud to steal sensitive corporate data. According to analysis from Hudson Rock, attackers obtain valid credentials using infostealer malware such as RedLine, Lumma, and Vidar, then use those credentials to access corporate cloud storage where MFA is not enforced. Stolen data includes government contracts, ERP source code, engineering documents, healthcare records, and defense-related files. The attackers act as initial access brokers, reselling compromised access to other threat actors.

Who is affected

Organizations using ShareFile, Nextcloud, or OwnCloud without enforced MFA and strong credential hygiene are at elevated risk.

Why CISOs should care

Credential-based cloud compromise can result in silent, large-scale data exfiltration without triggering perimeter defenses.

3 practical actions

1. Enforce MFA everywhere: Require multi-factor authentication for all cloud file-sharing platforms.

2. Monitor credential exposure: Track leaked credentials and force password rotation when exposure is detected.

3. Reduce infostealer risk: Strengthen phishing defenses and endpoint protection against credential-stealing malware.