Virtualization Technology News and Information
Article
RSS
Skyhigh Networks Reveals Sophisticated Cyber Attack Campaign on Enterprise Office 365 Users

Skyhigh Networks, the world's leading Cloud Access Security Broker (CASB) platform, today announced it has detected and remediated one of the first examples of an operationalized cloud-to-cloud threat in the enterprise. Attackers used popular cloud service platforms to conduct a persistent attack to log into corporate Office 365 accounts. Known as a ‘brute force' attack, Skyhigh has been tracking the campaign since early 2017, with targets including high-level employees at multiple Fortune 2000 organizations.

Cloud services are on path to become the standard for enterprise IT solutions. Office 365 has taken a dominant role as the productivity solution of choice for enterprise data; 58.4 percent of all sensitive corporate data in the cloud is stored in Office 365. This new cloud-to-cloud attack points to an IT security blind spot and anticipates the ‘new normal' of cloud-based attacks.

"Sensitive data has already moved to cloud applications, so it is only natural sophisticated attacks are following," said Slawomir Ligier, SVP of Engineering, Skyhigh. "While companies traditionally have invested extensively in perimeter security, those without a dedicated cloud security solution will lack visibility and control for a growing category of attacks. Enterprise cloud providers secure their infrastructure, but the ultimate responsibility to control access to sensitive data lies with the customer."

Anatomy of the Attack

Earlier this year, Skyhigh's CASB platform detected and defended against a ‘slow-and-low' pattern of coordinated attacks on high-value targets, including more than 100,000 failed Office 365 logins from 67 IP addresses and 12 networks. The attempts all came from instances hosted on cloud service platforms and targeted 48 different organizations. The duration and measured pace of the attacks suggest a determined effort and the desire to avoid detection. Within each organization, the attackers targeted a small number of senior employees across multiple departments.

A brute force attack typically refers to repeated guesses at an account password. In this case, the attackers tried logging in with different versions of employees' Office 365 usernames, suggesting they may already possess some combination of employee names and passwords and were seeking valid Office 365 usernames for data access or spear phishing campaigns. Password data could have been obtained in a database breach of a service like Yahoo or a phishing attack; studies have shown nearly half of online users reuse passwords across accounts. If the attackers confirmed an accurate Office 365 username with a correct reused password, they could successfully log into corporate Office 365 applications and potentially additional cloud service accounts.

Detection and Impact

Skyhigh's CASB detected and defended against the attack by correlating Office 365 API login data across employees and customers. The platform's Threat Protection feature analyzes cloud-user activity with cross-tenant machine learning algorithms to identify correlated anomalous behavior indicative of persistent threats that would have otherwise flown under the radar.

Skyhigh brought the attacks to the attention of targeted customers and have been working to help clients audit all cloud services in use, enforce secure login policies and provide a comprehensive picture of threat intelligence across cloud environments.

Published Thursday, July 20, 2017 9:17 AM by David Marshall
Filed under:
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
top25
Calendar
<July 2017>
SuMoTuWeThFrSa
2526272829301
2345678
9101112131415
16171819202122
23242526272829
303112345