{"id":28508,"date":"2024-12-12T09:08:53","date_gmt":"2024-12-12T09:08:53","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/?p=28508"},"modified":"2024-12-12T09:09:11","modified_gmt":"2024-12-12T09:09:11","slug":"broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/28508\/","title":{"rendered":"How safe is encrypted file storage?"},"content":{"rendered":"<p>No one can deny the convenience of cloud file-storage services like Dropbox or OneDrive. The one drawback is that cybercriminals, intelligence agencies, or the hosting provider itself can view your cloud-based files without authorization. But there\u2019s a more secure alternative: encrypted cloud file-storage. Some call it end-to-end encryption (E2EE) \u2014 similar to Signal and WhatsApp. According to the marketing blurb, files are encrypted on your device and sent to the cloud already in secure form \u2014 the encryption key remaining in your possession and no one else\u2019s. Not even the provider can sniff this information. But is that really the case?<\/p>\n<h2>Swiss-cheese encryption<\/h2>\n<p>The Applied Cryptography Group at ETH Zurich <a href=\"https:\/\/brokencloudstorage.info\/\" target=\"_blank\" rel=\"nofollow noopener\">took apart<\/a> the algorithms of five popular encrypted storage services: Sync.com, pCloud, Icedrive, Seafile, and Tresorit. In each of them, the researchers found errors in the implementation of encryption allowing, to varying degrees, file manipulation, and even access to fragments of unencrypted data. Earlier, they\u2019d discovered flaws in two other popular hosting services \u2014 \u00a0<a href=\"https:\/\/mega-awry.io\/\" target=\"_blank\" rel=\"nofollow noopener\">MEGA<\/a> and <a href=\"https:\/\/eprint.iacr.org\/2024\/546\" target=\"_blank\" rel=\"nofollow noopener\">Nextcloud<\/a>.<\/p>\n<p>In all cases, attacks are carried out from a malicious server. The scenario is as follows: the intruders either hack the encrypted hosting servers, or, by manipulating routers along the client-to-server path, force the victim\u2019s computer to connect to another server mimicking the genuine encrypted hosting server. If this tricky maneuver succeeds, the attackers can theoretically:<\/p>\n<ul>\n<li>In the case of <strong>com<\/strong>, plant folders and files with incriminating information, and change the file names and metadata of stored information. Also, the hacked server can send new encryption keys to the client, then decrypt any files downloaded afterwards. Plus, the built-in share function allows the malicious server to decrypt any file shared by the victim, since the decryption key is contained in the link that\u2019s sent when the server is accessed.<\/li>\n<li>In the case of <strong>pCloud<\/strong>, plant files and folders, arbitrarily move files and swap file names, delete file fragments, and decrypt files downloaded post-hack.<\/li>\n<li>In the case of <strong>Seafile<\/strong>, force the client to use an older version of the protocol, making it easier to bruteforce passwords, swap or delete file fragments, plant files and folders, and modify file metadata.<\/li>\n<li>In the case of <strong>Icedrive<\/strong>, plant files consisting of fragments of other files already uploaded to the cloud, change the name and location of stored files, and reorder file fragments.<\/li>\n<li>In the case of <strong>Tresorit<\/strong>, manipulate the metadata of stored files\u2014 including authorship.<\/li>\n<li>In the case of <strong>Nextcloud<\/strong>, manipulate encryption keys \u2014 allowing decryption of downloaded files.<\/li>\n<li>In the case of <strong>MEGA<\/strong>, restore encryption keys and thus decrypt all files. It\u2019s also possible to plant incriminating files.<\/li>\n<\/ul>\n<p>The malicious server in each case is a hard-to-implement but not blue-sky component of the attack. In light of the cyberattacks on <a href=\"https:\/\/www.crn.com\/news\/security\/microsoft-cloud-breach-included-theft-of-60-000-state-department-emails-reports\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft<\/a> and <a href=\"https:\/\/techcrunch.com\/2022\/08\/25\/twilio-hackers-group-ib\/\" target=\"_blank\" rel=\"nofollow noopener\">Twilio<\/a>, the possibility of compromising a major player is real. And of course, E2EE by definition needs to be resistant to malicious server-side actions.<\/p>\n<p>Without going into technical details, we note that the developers of all the services seem to have implemented bona fide E2EE and used recognized, strong algorithms like AES and RSA. But file encryption creates a lot of technical difficulties when it comes to document collaboration and co-authoring. The tasks required to overcome these difficulties and factor in all possible attacks involving modified encryption keys remain unsolved, but Tresorit has done a far better job than anyone else.<\/p>\n<p>The researchers point out that the developers of the various services made very similar errors independently of each other. This means that the implementation of encrypted cloud storage is fraught with non-trivial cryptographic nuances. What\u2019s needed is a well-developed protocol thoroughly tested by the cryptographic community \u2014 such as TLS for websites or the Signal Protocol for instant messengers.<\/p>\n<h2>Costly fixes<\/h2>\n<p>The biggest problem with fixing the identified bugs is that not only do the applications and server software need updating, but also, in many cases, user-saved files need re-encrypting. Not every hosting provider can afford these huge computational outlays. What\u2019s more, re-encryption is only possible in cooperation with each user \u2014 not unilaterally. Which is probably why fixes <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/severe-flaws-in-e2ee-cloud-storage-platforms-used-by-millions\/\" target=\"_blank\" rel=\"nofollow noopener\">are slow in coming:<\/a><\/p>\n<ul>\n<li><strong>com<\/strong> responded to the researchers after six months, and only after the appearance of press reports. Having finally woken up, they announced a fix for the problem of key leakage when sharing links, and said they\u2019d to patch the other flaws as well \u2014 but without giving a time frame.<\/li>\n<li><strong>Tresorit<\/strong> promised to fix the issue in 2025 (but the problem is less acute for them).<\/li>\n<li><strong>Seafile<\/strong> fixed the issue of protocol version downgrade without commenting on the other flaws.<\/li>\n<li><strong>Icedrive<\/strong> decided not to address the identified issues.<\/li>\n<li><strong>pCloud<\/strong> didn\u2019t respond to the researchers until the appearance of press reports, then announced that the attacks are theoretical and don\u2019t require immediate action.<\/li>\n<li><strong>Nextcloud<\/strong> fixed the issue and majorly reworked the overall approach to E2EE in <a href=\"https:\/\/github.com\/nextcloud\/desktop\/releases\/tag\/v3.12.0\" target=\"_blank\" rel=\"nofollow noopener\">version 3.12<\/a>. The updated encryption scheme has yet to be researched.<\/li>\n<li><strong>MEGA<\/strong> significantly <a href=\"https:\/\/blog.mega.io\/mega-security-update\" target=\"_blank\" rel=\"nofollow noopener\">lowered the likelihood of an attack<\/a> by introducing client-side checks.<\/li>\n<\/ul>\n<h2>What users need to do<\/h2>\n<p>Although the issues identified by the Applied Cryptography Group cannot be called purely theoretical, they do not represent a mass threat readily exploitable by cybercriminals. Therefore, hasty action isn\u2019t required; rather \u2014 a sober assessment of your situation is needed:<\/p>\n<ul>\n<li>How sensitive is the data in your storage, and how tempting is it to outsiders?<\/li>\n<li>How much data do you store in the encrypted service, and is it easy to move to another?<\/li>\n<li>How important are the collaboration and file-sharing features?<\/li>\n<\/ul>\n<p>If collaboration isn\u2019t important, while the data stored is critical, the best option is to switch to local file encryption. You can do this in a variety of ways \u2014 for example, by storing data in an encrypted container file or an archive with a strong password. If you need to transfer data to another device, you can upload an already encrypted archive to the cloud hosting service.<\/p>\n<p>If you want to combine collaboration and convenience with proper security guarantees, and the amount of stored data isn\u2019t that great, it\u2019s worth moving the data to one of the services that better withstood ETH Zurich\u2019s testing. That means Tresorit first and foremost, but don\u2019t discount MEGA and Nextcloud.<\/p>\n<p>If none of these solutions fits the bill, you can opt for other encrypted hosting services, but with additional precautions: avoid storing highly sensitive data, promptly update client applications, regularly check your cloud drives, and delete outdated or extraneous information.<\/p>\n<p>In any case, remember that the most likely attack on your data will take the shape of an infostealer simply compromising your computer or smartphone. Therefore, encrypted hosting must go hand in hand with <a href=\"https:\/\/www.kaspersky.co.uk\/premium?icid=gb_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">full anti-malware protection for all smartphones and computers<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Threats to data stored in Sync, pCloud, and other encrypted alternatives to Dropbox.<\/p>\n","protected":false},"author":2722,"featured_media":28509,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026],"tags":[2672,792,438,3035,261,2960,3123,3834,43,529,131,121],"class_list":{"0":"post-28508","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-tips","9":"tag-cloud","10":"tag-cloud-storage","11":"tag-e2e","12":"tag-encryption","13":"tag-end-to-end-encryption","14":"tag-hosting","15":"tag-pcloud","16":"tag-privacy","17":"tag-threats","18":"tag-tips-2","19":"tag-updates"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/28508\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/28376\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/23634\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/12202\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/27860\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/30657\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/29366\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/38743\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/13037\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/52766\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/22449\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/23227\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/31808\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/28634\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/34460\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/broken-sync-pcloud-tresorit-seafile-nextcloud-mega-icedrive\/34084\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/tips-2\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/28508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=28508"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/28508\/revisions"}],"predecessor-version":[{"id":28510,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/28508\/revisions\/28510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/28509"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=28508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=28508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=28508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}