29.3 C
New York
Saturday, June 28, 2025

Buy now

spot_img

Safety gaps present in encrypted cloud storage companies


Researchers from ETH Zurich have uncovered vital safety vulnerabilities in a number of broadly used end-to-end encrypted (E2EE) cloud storage companies.

The cryptographic flaws may enable attackers to bypass encryption, compromise file confidentiality, tamper with information, and even inject unauthorised information into customers’ storage.

The examine analysed 5 E2EE cloud storage suppliers—Sync, pCloud, Seafile, Icedrive, and Tresorit—which collectively serve an estimated 22 million customers worldwide. Every of the companies guarantees strong encryption to safeguard information from unauthorised entry, even by the service supplier.

Nonetheless, researchers Jonas Hofmann and Kien Tuong Truong found that 4 of the 5 have extreme flaws that may weaken protections. Introduced on the ACM Convention on Pc and Communications Safety (CCS), their findings spotlight potential gaps within the E2EE safety guarantees made by suppliers.

Tresorit stands out however isn’t flawless

Of the companies examined, Tresorit demonstrated the fewest vulnerabilities, with solely minor dangers of metadata tampering and non-authentic keys throughout file sharing. Though much less extreme, these points may nonetheless pose dangers in sure situations. In distinction, the opposite 4 companies exhibited extra substantial safety gaps, rising the possibilities of information publicity or tampering.

Key vulnerabilities and real looking threats to E2EE

To guage the energy of E2EE safety, researchers examined ten totally different assault situations, assuming the attacker had already gained management over a cloud server with permissions to learn, modify, or inject information. Although this stage of entry is unlikely, the examine contends that E2EE ought to be efficient even underneath such situations. Some notable vulnerabilities are:

  • Unauthenticated Key Materials: Each Sync and pCloud had been discovered to have unauthenticated encryption keys, permitting attackers to insert their very own keys, decrypt information, and entry delicate information.
  • Public key substitution: Sync and Tresorit had been susceptible to unauthorised key substitute throughout file sharing, permitting attackers to intercept or change information.
  • Protocol downgrade assault: The protocols utilized by Seafile allowed for a downgrade to weaker encryption requirements, making it extra susceptible to brute-force assaults.

Different dangers had been recognized in Icedrive and Seafile, which used unauthenticated encryption modes, permitting attackers to change and corrupt file contents. Moreover, vulnerabilities within the “chunking” course of throughout a number of companies may compromise file integrity by permitting attackers to reorder, take away, or alter file items.

Supplier gives responses and subsequent steps

In April 2024, the researchers shared their findings with Sync, pCloud, Seafile, and Icedrive, adopted by Tresorit in September. Responses different, with Sync and pCloud but to reply, Seafile getting ready to patch the protocol downgrade challenge, and Icedrive declining to deal with the considerations. Tresorit acknowledged receipt however declined to talk extra.

In line with a latest BleepingComputer report, Sync indicated that they’re “fast-tracking fixes” and have already resolved a few of the documented information leak points with file-sharing hyperlinks.

ETH Zurich researchers imagine these safety flaws are widespread throughout many E2EE cloud storage platforms, underscoring the necessity for additional investigation and a standardised protocol to make sure safe encryption within the business.

(Picture by Roman)

See additionally: Why corporations proceed to wrestle with cloud visibility – and code vulnerabilities

Wish to be taught extra about cybersecurity and the cloud from business leaders? Take a look at Cyber Safety & Cloud Expo happening in Amsterdam, California, and London. Discover different upcoming enterprise expertise occasions and webinars powered by TechForge right here.

Tags: , , ,

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Stay Connected

0FansLike
0FollowersFollow
0SubscribersSubscribe
- Advertisement -spot_img

Latest Articles

Hydra v 1.03 operacia SWORDFISH