Office 365: A Vehicle for Internal Phishing Attacks

  /     /     /  
Publicated : 22/11/2024   Category : security


Office 365: A Vehicle for Internal Phishing Attacks


A new threat uses internal accounts to spread phishing attacks, making fraudulent emails even harder to detect.



Cybercriminals go where the users are. Office 365, which has more than 100 million active monthly subscribers, has become a hotspot for compelling and personalized cyberattacks. Users trust emails from coworkers, especially those with the correct corporate email address.
Traditional phishing attempts have red flags: suspicious attachments, bold requests, misspelled words, questionable email addresses. Users know how to react to these. But what happens when attacks are more personalized, with legitimate addresses and reasonable requests?
These have become more popular and tougher to spot, says Asaf Cidon, spearphishing expert at Barracuda. The company recently released a report on a threat he calls Account Compromise. Once they have an employees Office 365 account information, threat actors can craft realistic-looking messages and send them from an account their victims trust.
Attackers primarily steal credentials using traditional methods, he continues. Most rely on phishing or spearphishing to send victims to fraudulent websites, where they are prompted to reset their Office 365 credentials. Some buy users credentials on the dark web.
Whats new is what happens after they get access to the accounts, Cidon says. Threat actors can conduct several types of attacks after they gain a foothold in an organization.
In one common scenario, an attacker sets forwarding rules on an Office 365 account to send emails to an account they control. From there, they can both steal data and monitor the users internal and external communication patterns so they can plan future attacks.
Threat actors also impersonate their victims and send emails to other employees with the goal of collecting data. Some send emails with PDF attachments that can only be opened with a username and password. Some send an invoice for payment that requires logging into a web portal, where they have to log in with a corporate email address and password.
Damage could potentially extend outside the organization. Cidon explains a scenario in which an attacker, impersonating an employee, used their access to request a wire transfer from a partner company. The employee in the scenario didnt even realize the transfer was happening.
This is an evolution of spearphishing - were seeing more and more sophistication, he says. A couple of years ago, cyberattackers primarily targeted executive employees. These new Office 365 threats are putting all employees at risk.
With this attack, theyre just trying to get in and once theyre in, a lot of the employees getting targeted are not high-level. Its not just executive targets, Cidon continues.
There are red flags that signify a company is targeted in one of these attacks. Oftentimes the IP addresses used to log into corporate accounts come from other countries, he says, and looking at the log can identify geographical anomalies. It also helps to keep track of your email account to see when emails are getting forwarded or sent to unfamiliar addresses.
Cidon advises security leaders to train employees on how to spot phishing attacks to prevent attackers gaining initial access. He also advises adding security layers like multi-factor authentication to Office 365 to lessen the chance of a break-in.
Traditional email security systems are going to be almost useless in stopping this, he says, noting how most tools look at the API of the email provider. Once an attacker is in, they dont see internal emails … only the external emails coming in.
Related Content:
Antivirus: From Stand-Alone Product to Endpoint Feature
10 Time-Consuming Tasks Security People Hate
How Hackers Hide Their Malware: The Basics
Cloud Security Alliance Offers Metrics for Cyber Resiliency
Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Click for
more info
and to
register
.

Last News

▸ Making use of a homemade Android army ◂
Discovered: 23/12/2024
Category: security

▸ CryptoWall is more widespread but less lucrative than CryptoLocker. ◂
Discovered: 23/12/2024
Category: security

▸ Feds probe cyber breaches at JPMorgan, other banks. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Office 365: A Vehicle for Internal Phishing Attacks