AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
A360drive9/10/2023 ![]() ![]() If those files fail to migrate again, the customer can download those files manually and upload the files to Autodesk Drive. ![]() If it has been 24 hours since the customer’s last migration, they can retry the migration again. Any files that fail to migrate will be listed in the “Recent Activity” tab of A360 Drive. If it is not, ask your administrator if they can assign you to a license for Recap Pro or the AEC Collection. If it is listed on that page, you have a license. To check if you have a license for Autodesk Drive, go to your Autodesk Account Management Portal, and click “all products and services”.Online viewing, sharing and collaboration of published scans is now done in Autodesk Drive.BIM 360 Docs licenses will be automatically converted to Autodesk Drive licenses on July 7, 2021.Publish and 3D photo reconstruction functions will only be available with Autodesk Drive after 6/24/21.It’s not a novel technique, but our correlation of the indicators of compromise (IoCs) suggests that a potentially sustained, cybercriminal operation took advantage of this platform. We found that after they were downloaded and executed, the RATs/ backdoors would phone back to their respective command-and-control servers, which are resolvable via free DNS services. The payloads we saw during our research-remote access tools (RATs)-are also notable. ![]() It resembled the way Google Drive was misused as a repository of stolen data, for instance. Abusing A360 as a malware delivery platform can enable attacks that are less likely to raise red flags. We saw a similar-albeit a lot simpler and less creative-attack on Autodesk® A360, comparable to the way file-sharing sites are being used to host malware. GitHub was misused this way when the Winnti group used it as a conduit for its C&C communications. ![]() Cloud-based storage platforms have a history of cybercriminal abuse, from hosting malicious files and directly delivering malware to even making them part of a command-and-control (C&C) infrastructure. ![]()
0 Comments
Read More
Leave a Reply. |