Cybersecurity researchers detail attacks that exploit legitimate cloud services in attempts to access sensitive data.