Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

02:50 PM
Connect Directly

How Advanced Attackers Take Aim at Office 365

Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.

Microsoft Office 365 is quickly becoming the most common business email platform and a hot target for cybercriminals following their enterprise victims to the cloud. The size, complexity, and data stores in Office 365 make it an appealing and often easy target for advanced actors.

Since he started working at Mandiant more than four years ago, manager Josh Madeley has seen attackers use Office 365 in ways he never previously considered while handling large intrusion investigations. As more companies adopted the platform, advanced persistent threat (APT) groups started to use tactics nobody had discussed let alone developed investigative methodology for, he says. 

Office 365 encompasses not only Microsoft Exchange, but also Teams, SharePoint, OneDrive, and other popular enterprise tools. The sheer amount of data stored in the full platform means attackers often don't need to compromise the on-premises network to get what they're after.

The past year alone has seen multiple cases in which APT actors have realized Office 365 is a "gold mine of information," adds Doug Bienstock, principal consultant at Mandiant. His work in red teaming and incident response has led Bienstock down the path of investigating the Office 365 platform from an attacker's perspective. They're becoming experts in it, he says. 

Madeley and Bienstock's research into APT attacks targeting Office 365 has given them insight into how and why advanced adversaries use it. Most APTs target an organization to steal data or gain additional access; sometimes they target one business with the goal of breaching another. Advanced attackers seek long-term, persistent access and will use techniques that enable them to keep access to a mailbox for a period of months or years.

Email isn't the only target, they say. Many seek access to Teams, where developers chat about API keys and vulnerabilities, or SharePoint and OneDrive, where sensitive files are usually stored. "It's really a huge treasure trove of information," Bienstock says. "Especially in the last six months with COVID, it's what a lot of organizations are dependent on to work together."

Unskilled attackers typically target Office 365 with business email compromise (BEC). In the APT model, intruders acquire administrator credentials for the infrastructure so they can access the configuration of Office 365 and learn how it integrates with the on-premises network. Active Directory, Madeley and Bienstock say, is an example of a main integration point; APT actors have taken advantage of this to ensure persistent access to Office 365 content. Sometimes they exploit bugs in the way Office 365 validates configuration changes, and sometimes they act as an admin to access data.

Legacy software is a consistent issue across organizations and software vendors, says Bienstock. In one 2020 investigation he and Madeley and managed, an attacker learned if they accessed Office 365 using a piece of software from 2016, they could bypass the business' multifactor authentication (MFA) requirement. This wasn't an issue Microsoft was aware of at the time, but it was a legacy loophole that had never been closed.

To pull this off, an attacker would have to download an old version of the target software and go through trial and error to see what worked – not something an unskilled actor would do.

On the data theft side, Madeley says some attackers abuse Office 365's built-in security tools designed for admins to detect malicious activity. Some actors are using these tools to sneak in, noticing the logging mechanisms are insufficient in detecting and analyzing which data was stolen. These tools have the greatest access but don't raise any red flags, he points out.

Madeley and Bienstock will discuss more of these attack methods in their upcoming Black Hat USA talk, "My Cloud is APT's Cloud: Investigating and Defending Office 365," on August 6, 2020.

Improving Defenses: What Businesses Can Do
"As we work with organizations, we realize they don't necessarily have the same experience in investigating these things," Madeley says of cloud intrusions. While he's an advocate of moving to the cloud and believes cloud platforms are more secure in most instances, he also sees a learning curve for businesses that have managed servers in a more traditional way versus the growing platform-as-a-service (PaaS) models.

There is a misconception that Office 365 is just an email platform, Bienstock adds, "but it's really much more than that." He and Madeley are trying to shine a spotlight on this and help people realize they need to invest time and effort in improving their security posture and educating analysis and defenders. Microsoft updates its platforms often, and they need to be in the loop.

Madeley advises organizations to take a closer look at their shared security model and identify where Microsoft assumes responsibility for certain parts of the infrastructure, and where they assume the remaining portion. "Where is that gap? What's between that gap? Where does Microsoft start and stop, and where does user knowledge of tools start and stop?" he asks.

Businesses should also enable MFA if they haven't already, Bienstock adds. "You'd be surprised how many organizations of all shapes and sizes are not enforcing multifactor for Office 365," he says.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "The Entertainment Biz Is Changing, but the Cybersecurity Script Is One We've Read Before."

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow on the size parameter of the tz_map_shared_mem function.
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel�s tz_handle_trusted_app_smc function where a lack of integer overflow checks on the req_off and param_ofs variables leads to memory corruption of critical kernel structures.
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in TSEC TA which deserializes the incoming messages even though the TSEC TA does not expose any command. This vulnerability might allow an attacker to exploit the deserializer to impact code execution, causing information disclosure.
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in all TAs whose deserializer does not reject messages with multiple occurrences of the same parameter. The deserialization of untrusted data might allow an attacker to exploit the deserializer to impact code execution.