Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
Cookie Policy Privacy Policy {title}
Skip to content

CloudTech is part of the TechForge Publications series

  • View All
  • AI News
  • The Block
  • Developer
  • Edge Computing News
  • IoT News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Sustainability News
  • Telecoms
  • View All
  • AI News
  • The Block
  • Developer
  • Edge Computing News
  • IoT News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Sustainability News
  • Telecoms

TechForge

  • Search
  • News
  • Categories
    • Applications
      • Blockchain
      • Containers
      • Data Centres
      • Infrastructure as a Service
      • Platform as a Service
      • Software as a Service
      • Virtualisation
    • Companies
      • Alibaba Cloud
      • AWS
      • Google Cloud
      • Microsoft
    • Data & Analytics
    • Enterprise
      • Cloud Migration
      • Collaboration
      • Digital Transformation
      • Future Work
      • Hybrid Cloud
      • Private Cloud
      • Public Cloud
    • Industries
      • Banking & Finance
      • Healthcare
      • Public Sector
      • Retail & Consumer
      • Telecoms
    • Infrastructure
    • Interviews
    • IoT
    • Platforms
    • Privacy
    • Regulation & Government
    • Security
    • Sponsored Content
  • Events
  • Resources
    • All Resources
    • On-demand Webinars
    • Exclusive Videos
  • More
    • Advertise
    • Contact Us
    • About Us
  • Search
  • News
  • Categories
    • Applications
      • Blockchain
      • Containers
      • Data Centres
      • Infrastructure as a Service
      • Platform as a Service
      • Software as a Service
      • Virtualisation
    • Companies
      • Alibaba Cloud
      • AWS
      • Google Cloud
      • Microsoft
    • Data & Analytics
    • Enterprise
      • Cloud Migration
      • Collaboration
      • Digital Transformation
      • Future Work
      • Hybrid Cloud
      • Private Cloud
      • Public Cloud
    • Industries
      • Banking & Finance
      • Healthcare
      • Public Sector
      • Retail & Consumer
      • Telecoms
    • Infrastructure
    • Interviews
    • IoT
    • Platforms
    • Privacy
    • Regulation & Government
    • Security
    • Sponsored Content
  • Events
  • Resources
    • All Resources
    • On-demand Webinars
    • Exclusive Videos
  • More
    • Advertise
    • Contact Us
    • About Us
Subscribe
Subscribe
  • Search
  • News
  • Categories
    • Applications
      • Blockchain
      • Containers
      • Data Centres
      • Infrastructure as a Service
      • Platform as a Service
      • Software as a Service
      • Virtualisation
    • Companies
      • Alibaba Cloud
      • AWS
      • Google Cloud
      • Microsoft
    • Data & Analytics
    • Enterprise
      • Cloud Migration
      • Collaboration
      • Digital Transformation
      • Future Work
      • Hybrid Cloud
      • Private Cloud
      • Public Cloud
    • Industries
      • Banking & Finance
      • Healthcare
      • Public Sector
      • Retail & Consumer
      • Telecoms
    • Infrastructure
    • Interviews
    • IoT
    • Platforms
    • Privacy
    • Regulation & Government
    • Security
    • Sponsored Content
  • Events
  • Resources
    • All Resources
    • On-demand Webinars
    • Exclusive Videos
  • More
    • Advertise
    • Contact Us
    • About Us

Cloud Computing

Security gaps found in encrypted cloud storage services

Muhammad Zulhusni

1st November 2024

Security gaps found in encrypted cloud storage services

Share this story:

Tags:

cloud
Cloud Security
cybersecurity
Security

Categories::

Cloud Computing
Infrastructure
Privacy
Research
Security

Researchers from ETH Zurich have uncovered significant security vulnerabilities in several widely used end-to-end encrypted (E2EE) cloud storage services.

The cryptographic flaws could allow attackers to bypass encryption, compromise file confidentiality, tamper with data, or even inject unauthorised files into users’ storage.

The study analysed five E2EE cloud storage providers—Sync, pCloud, Seafile, Icedrive, and Tresorit—which collectively serve an estimated 22 million users worldwide. Each of the services promises robust encryption to safeguard files from unauthorised access, even by the service provider.

However, researchers Jonas Hofmann and Kien Tuong Truong discovered that four of the five have severe flaws that might weaken protections. Presented at the ACM Conference on Computer and Communications Security (CCS), their findings highlight potential gaps in the E2EE security promises made by providers.

Tresorit stands out but isn’t flawless

Of the services tested, Tresorit demonstrated the fewest vulnerabilities, with only minor risks of metadata tampering and non-authentic keys during file sharing. Although less severe, these issues could still pose risks in certain scenarios. In contrast, the other four services exhibited more substantial security gaps, increasing the chances of data exposure or tampering.

Key vulnerabilities and realistic threats to E2EE

To evaluate the strength of E2EE security, researchers tested ten different attack scenarios, assuming the attacker had already gained control over a cloud server with permissions to read, modify, or inject data. Though this level of access is unlikely, the study contends that E2EE should be effective even under such conditions. Some notable vulnerabilities are:

  • Unauthenticated Key Material: Both Sync and pCloud were found to have unauthenticated encryption keys, allowing attackers to insert their own keys, decrypt files, and access sensitive data.
  • Public key substitution: Sync and Tresorit were vulnerable to unauthorised key replacement during file sharing, allowing attackers to intercept or change files.
  • Protocol downgrade attack: The protocols used by Seafile allowed for a downgrade to weaker encryption standards, making it more vulnerable to brute-force attacks.

Other risks were identified in Icedrive and Seafile, which used unauthenticated encryption modes, allowing attackers to modify and corrupt file contents. Additionally, vulnerabilities in the “chunking” process across multiple services could compromise file integrity by allowing attackers to reorder, remove, or alter file pieces.

Provider provides responses and next steps

In April 2024, the researchers shared their findings with Sync, pCloud, Seafile, and Icedrive, followed by Tresorit in September. Responses varied, with Sync and pCloud yet to respond, Seafile preparing to patch the protocol downgrade issue, and Icedrive declining to address the concerns. Tresorit acknowledged receipt but declined to speak more.

According to a recent BleepingComputer report, Sync indicated that they are “fast-tracking fixes” and have already resolved some of the documented data leak issues with file-sharing links.

ETH Zurich researchers believe these security flaws are common across many E2EE cloud storage platforms, underscoring the need for further investigation and a standardised protocol to ensure secure encryption in the industry.

(Image by Roman)

See also: Why companies continue to struggle with cloud visibility – and code vulnerabilities

Want to learn more about cybersecurity and the cloud from industry leaders? Check out Cyber Security & Cloud Expo taking place in Amsterdam, California, and London. Explore other upcoming enterprise technology events and webinars powered by TechForge here.

About the Author

Muhammad Zulhusni

Journalist

As a tech journalist, Zul focuses on topics including cloud computing, cybersecurity, and disruptive technology in the enterprise industry. He has expertise in moderating webinars and presenting content on video, in addition to having a background in networking technology.

Related

CISA issues guidance amid unconfirmed Oracle Cloud breach

21st April 2025

Trade tensions prompt European firms to rethink cloud strategies

21st April 2025

$100M IFC investment in sub-Saharan Africa data centres

11th April 2025

Dr Mary Aiken, University of East London: The Intersection of technology and human behaviour in cybersecurity

11th April 2025

Join our Community

Subscribe now to get all our premium content and latest tech news delivered straight to your inbox

Click here

Popular

Cloud Computing

Oracle Cloud denies breach as hacker offers 6 million records for sale

4304 view(s)

Applications

Netflix countersues Broadcom over VMware patents

3086 view(s)

Cloud Computing

5 of the best: cloud technology training platforms

3057 view(s)

Infrastructure

Microsoft’s palm-sized chip brings practical quantum computing within reach

2467 view(s)
See all

Latest

View All Latest

Interviews

11th April 2025

Dr Mary Aiken, University of East London: The Intersection of technology and human behaviour in cybersecurity

Google unveils Cloud WAN and Gemini Tools to simplify app development Google Cloud Next 2025

Applications

10th April 2025

Google Cloud Next 25: AI, cloud, and WAN

Deutsche Telekom extends Google Cloud partnership through 2030

Cloud Computing

10th April 2025

Deutsche Telekom extends Google Cloud partnership through 2030

Subscribe

All our premium content and latest tech news delivered straight to your inbox

Subscribe

Explore

  • About Us
  • Contact Us
  • Newsletter
  • Privacy Policy
  • Cookie Policy
  • About Us
  • Contact Us
  • Newsletter
  • Privacy Policy
  • Cookie Policy

Reach Our Audience

  • Advertise
  • Post a Press Release
  • Contact Us
  • Advertise
  • Post a Press Release
  • Contact Us

Categories

  • Applications
  • Companies
  • Data & Analytics
  • Enterprise
  • Industries
  • IoT
  • Infrastructure
  • Platforms
  • Sponsored Content
  • Applications
  • Companies
  • Data & Analytics
  • Enterprise
  • Industries
  • IoT
  • Infrastructure
  • Platforms
  • Sponsored Content

Other Publications

  • Explore All
  • AI News
  • Developer
  • IoT News
  • Edge Computing News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Telecoms
  • The Block
  • Sustainability News
  • Explore All
  • AI News
  • Developer
  • IoT News
  • Edge Computing News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Telecoms
  • The Block
  • Sustainability News

CloudTech News is part of TechForge 

Subscribe

All our premium content and latest tech news delivered straight to your inbox

Permissions(Required)
This field is for validation purposes and should be left unchanged.

Notifications