Hackers target Office 365 business accounts
Account takeover attacks are on the rise
New research from Barracuda has revealed that account takeover attacks are one of the fastest growing email security threats as hackers set their sights on Microsoft Office 365 accounts.
The IT security company recently analyzed account takeover attacks targeted at its customers to discover that 29 percent of organizations had their Office 365 accounts compromised by hackers in March of this year.
In March alone, over 1.5m malicious and spam emails were sent from hacked Office 365 accounts highlighting the potential impact this security threat poses.
- One in five email attacks use compromised accounts
- Phishing scams account for half of all fraud attacks
- Cloud security and the evolution of attack methods
Hackers executed the account takeover attacks using a variety of methods including reusing stolen credentials, brute-force attacks, social engineering, phishing and even SMS to trick their victims into providing their account details.
Account takeover attacks
Office 365 account takeover attacks begin with infiltration and many hackers impersonate Microsoft and other large firms as a means of tricking users into disclosing their login credentials. In fact, Microsoft is the most impersonated brand in the world with 1 in 3 attacks impersonating the company.
Once an account has been compromised, hackers rarely launch an attack straightaway. Instead, they monitor email and track activity in the company to help maximize their chances of executing a successful attack.
One trick that scammers use to avoid detection is setting up mailbox rules to hide or delete any emails they send from the compromised account. According to Barracuda's March 2019 analysis, hackers set up malicious rules to hider their activity in 34 percent of the nearly 4,000 compromised accounts.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
After the reconnaissance has been completed, cybercriminals use the harvested credentials to target other high-value accounts in an organization with executives and finance department employees being prime targets. They also use compromised accounts to monetize attacks by stealing personal, financial and confidential data to use it to commit identity theft, fraud and other crimes.
To protect your business from account takeover attacks, Barracuda recommends using AI to scan your emails, deploying account takeover protection, using multi-factor authentication, monitoring inbox rules and suspicious logins and training employees to recognize and report attacks.
- Worried about your Office 365 account falling victim to hackers? We've also highlighted the best Microsoft Office alternatives
After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.