Kuboid
Open Luck·Kuboid.in
Black Hat2023
Open in YouTube ↗

Insider Threats Packing Their Bags With Corporate Data

Black Hat1,491 views26:08over 2 years ago

This talk analyzes data exfiltration patterns by departing employees using cloud-based applications. It demonstrates how to identify malicious insider activity by monitoring three specific signals: volume of data, nature of the data, and direction of the data flow. The research highlights that 75% of exfiltrated data is moved within the final 50 days of employment, often to personal cloud storage instances. The speakers propose a detection framework combining anomaly detection and data labeling to reduce false positives and improve detection efficacy.

Detecting the Silent Exfiltration: How Departing Employees Abuse Cloud Storage

TLDR: Departing employees often exfiltrate sensitive data to personal cloud storage long before they submit their resignation. By monitoring the volume, nature, and direction of data movement, security teams can identify these threats weeks before the standard notice period. This research provides a framework for using data labeling and anomaly detection to cut through the noise and catch exfiltration in real-time.

Most security teams focus their energy on external attackers, but the most damaging data breaches often come from someone with a valid badge and a grudge. When an employee decides to leave, they frequently feel entitled to take "their" work with them. This isn't always a malicious act of corporate espionage; often, it is just a misguided attempt to save a portfolio or a set of personal notes. Regardless of intent, the result is the same: sensitive intellectual property and PII end up in personal cloud instances where the organization has zero visibility or control.

The Mechanics of Pre-Resignation Exfiltration

Research presented at Black Hat 2023 analyzed over 4.7 million active users across 207 organizations to map the behavior of departing employees. The data shows a clear, predictable pattern. While many security teams wait for the "two weeks' notice" to trigger an investigation, the actual exfiltration starts much earlier.

Seventy-five percent of all files moved to personal cloud apps are uploaded within the final 50 days of employment. This creates a massive window of opportunity for detection that most organizations completely miss. The attack flow is straightforward: an employee identifies a set of files they want to keep, then uses a standard browser-based upload to a personal Google Drive, Gmail, or Microsoft OneDrive account. Because these are legitimate, everyday tools, the traffic rarely triggers traditional Data Loss Prevention (DLP) alerts unless the policy is exceptionally well-tuned.

Identifying the Signals

To catch this, you need to move beyond simple heuristic-based alerts. A rule that triggers on "more than five files uploaded" is useless; it generates too many false positives and misses the user who uploads one massive, sensitive archive. Instead, you need to look at three distinct signals:

  1. Volume: Is the user uploading significantly more data than their historical baseline?
  2. Nature: Does the file content match your organization's definition of sensitive data, such as source code, financial records, or PII?
  3. Direction: Is the destination a managed corporate instance or an unmanaged personal one?

The most effective approach combines anomaly detection with data labeling. By applying instance labels to distinguish between corporate and personal cloud instances, you can immediately filter out legitimate business traffic. When you layer this with DLP policies that flag specific file types or sensitive keywords, the signal-to-noise ratio improves dramatically.

For example, a basic query in a SIEM or Netskope Security Cloud might look for the intersection of these events:

SELECT user, destination_app, file_type, volume 
FROM cloud_logs 
WHERE instance_label = 'personal' 
AND sensitivity_label = 'intellectual_property' 
AND volume > user_historical_average * 5;

This query doesn't just look for "bad" behavior; it looks for behavior that is anomalous for that specific user, directed at an unmanaged destination, and involving high-value data.

Real-World Applicability for Pentesters

During a red team engagement or a penetration test, you rarely need to drop complex malware to exfiltrate data. If you have compromised a user's session or are operating as an insider, the path of least resistance is almost always the browser.

If you are testing an organization's detection capabilities, don't just try to dump a database. Instead, simulate a departing employee. Identify a few non-sensitive but "labeled" files, and move them to a personal cloud storage account. If the security team doesn't flag the transfer, they have a blind spot in their cloud monitoring. This is a common finding in Broken Access Control assessments, where the focus is on the movement of data rather than just the access to it.

The Defensive Reality

Defenders cannot simply block access to all cloud storage; it kills productivity and forces users to find even less secure workarounds. The goal is to gain visibility into the intent of the data movement. If you have a DLP solution, stop treating it as a blunt instrument that blocks everything. Use it to generate high-fidelity alerts that correlate user behavior with data sensitivity.

If you aren't monitoring uploads to personal cloud instances, you are effectively blind to the most common form of data leakage. Start by mapping your users' typical data movement patterns. Once you have a baseline, you can start flagging the outliers. The goal isn't to stop every single file transfer, but to identify the 2% of departing employees who are actively stripping your environment of its most valuable assets.

Stop waiting for the resignation letter to start your investigation. The data is already walking out the door long before the HR paperwork is filed. Start looking at the logs today, and you might find that the biggest threat to your data is already sitting at their desk.

Talk Type
research presentation
Difficulty
intermediate
Category
blue team
Has Demo Has Code Tool Released


Black Hat Asia 2023

45 talks · 2023
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in