Vectra security research identifies how cyberattackers use Microsoft Office 365 tools against organizations to steal data
SAN JOSE, Calif., Oct. 13, 2020 /PRNewswire/ -- Vectra(®), a leader in network threat detection and response (NDR), today released its 2020 Spotlight Report on Microsoft Office 365, which highlights the use of Office 365 in enterprise cyberattacks. The report explains how cybercriminals use built-in Office 365 services in their attacks.
Attacks that target software-as-a-service (SaaS) user accounts are one of the fastest-growing and most prevalent problems for organizations, even before COVID-19 forced the vast and rapid shift to remote work. With many organizations increasing their cloud software usage, Microsoft has dominated the productivity space, with more than 250 million active users each month. Office 365 is the foundation of enterprise data sharing, storage, and communication for many of those users, making it an incredibly rich treasure trove for attackers.
"Within the new work-from-home paradigm, user account takeover in Office 365 is the most effective way for an attacker to move laterally inside an organization's network," said Chris Morales, head of security analytics at Vectra. "We expect this trend to magnify in the months ahead. Attackers will continue to exploit human behaviors, social engineering, and identity theft to establish a foothold and to steal data in every type of organization."
Even with the increasing adoption of security postures to protect user accounts such as multifactor authentication (MFA), 40 percent of organizations still suffer from Office 365 breaches, leading to massive financial and reputational losses. In a recent study, analyst firm Forrester Research put the cost of account takeovers at $6.5 billion to $7 billion in annual losses across multiple industries.
Highlights from the Vectra 2020 Spotlight Report on Office 365 include:
-- 96 percent of customers sampled exhibited lateral movement behaviors -- 71 percent of customers sampled exhibited suspicious Office 365 Power Automate behaviors -- 56 percent of customers sampled exhibited suspicious Office 365 eDiscovery behaviors
The report is based on the participation of 4 million Microsoft Office 365 accounts monitored by Vectra from June-August 2020, representing the first 90 days of market availability for the company's SaaS product, Cognito Detect((TM)) for Office 365.
Click here to download the Vectra 2020 Spotlight Report on Office 365. Read our companion blog here.
About Vectra
Vectra(®) is a leader in network detection and response - from cloud and data center workloads to user and IoT devices. Its Cognito(®) platform accelerates threat detection and investigation using AI to enrich network metadata it collects and stores with the right context to detect, hunt and investigate known and unknown threats in real time. Vectra offers three applications on the Cognito platform to address high-priority use cases. Cognito Stream((TM)) sends security-enriched metadata to data lakes and SIEMs. Cognito Recall((TM)) is a cloud-based application to store and investigate threats in enriched metadata. And Cognito Detect((TM)) uses AI to reveal and prioritize hidden and unknown attackers at speed. For more information, visit vectra.ai.
Media contact
Allison Arvanitis
Lumina Communications for Vectra
vectra@luminapr.com
View original content:http://www.prnewswire.com/news-releases/vectra-security-research-identifies-how-cyberattackers-use-microsoft-office-365-tools-against-organizations-to-steal-data-301150035.html
SOURCE Vectra