Microsoft cloud services (which includes OneDrive, Sharepoint, and others) are opening and looking into the contents of password-protected Zip files stored on their servers. This obviously poses a privacy concern to anyone using their systems.
It has been known for a while that Microsoft has opened compressed Zip files to check for malware and viruses, etc., but if you wanted to keep a service provider from seeing the contents of a file, you would encrypt it.
How do we know that Microsoft is scanning the contents of Zip files? Security expert Andrew Brandt, the principal security researcher at Sophos, shared his findings in a post on Mastodon.
Well, apparently #microsoft #Sharepoint now has the ability to scan inside password-protected zip archives.
How do I know? Because I have a lot of Zips (encrypted with a password) that contain malware and my typical method of sharing those is to upload those passworded Zips into a Sharepoint directory.
This morning, I discovered that a couple of password-protected Zips are flagged as “Malware detected” which limits what I can do with those files – they are basically dead space now.
In an article in Ars Technica, Kevin Beaumont, a fellow researcher, confirmed that Microsoft not only scans password-protected Zip files in Sharepoint but in all of its 365 cloud services.
Of course, Microsoft has not issued a notice or explanation of why it is scanning password-protected Zip files but we can assume it is to find infected content. But who knows – they could be scanning for a whole lot more!
Microsoft customers use encrypted files to store private information or to safely exchange information over the internet. Microsoft scanning and exploring these files is concerning. Furthermore, Microsoft may be required to share this information with government agencies. This is an obvious privacy concern for customers paying Microsoft for their service!
What Else Is Microsoft Scanning?
The only reason we know Microsoft is unencrypting password-protected Zip files is that they are removing infected content with their malware detectors. But, what else is Microsoft scanning? Are they scanning password-protected Word documents? Password-protected Excel files and other Office documents? Other password-protected archive programs like 7-Zip and RAR? If so, what are they doing with this information?
How Is Microsoft Decrypting Zip Files?
Since Microsoft has not issued any notice of what, how, or why they are scanning password-encrypted files, we do not know exactly. But we can make some assumptions:
- First, Microsoft may be brute force decrypting encrypted files. Zip files have two encryption methods: AES encryption and Standard Zip 2.0 / ZipCrypto encryption. Zip 2.0 / ZipCripto encryption is not very strong (even WinZip states that it is weak) and Microsoft may be opening all of these as well as weak passworded AES files. Brandt mentioned that his passwords were not very strong
- Second, Microsoft may be reading emails or looking at “clues” the file owner may have given themselves in the archive file. Beaumont wrote: “If you mail yourself something and type something like ‘ZIP password is Soph0s’, ZIP up EICAR and ZIP password it with Soph0s, it’ll find (the) password, extract and find (and feed MS detection)”
- Third, Microsoft may be applying a list of common passwords to the password-encrypted files to see if they will open. Brandt noted that some, but not all, of his files were flagged as “Malware detected”
How To Protect Your Privacy On Microsoft’s Online Services
If you choose to store password-encrypted files, whether they are Zip files, Office documents, or other types of files, on Microsoft servers, you will want to take some precautions.
- First, when given a choice of encryption methods, always choose the strongest method
- Second, use a strong password
- Third, do not store password clues in file names or archive names
- Fourth, never send the password in an email with the encrypted file. If possible, use a separate method to send the password than sending the file. Even better would be to use some kind of secure messaging service (Signal, WhatsApp, etc.) or a secure sending service (Bitwarden Send, for example) to send the password (or even the password-encrypted file)
Even though Microsoft probably feels justified in opening and scanning password-encrypted files for viruses and malware, Microsoft’s scanning of password-encrypted files is simply wrong and is a major privacy concern. Microsoft’s paying customers deserve better than this. If you are a Microsoft cloud service customer, let me know in the comments how you feel about Microsoft scanning your encrypted files.