
Based on Microsoft’s metrics, more than 99.9% of successful business email compromise occurs on accounts without MFA enabled. One of the biggest steps that an organization can take to mitigate the risk of business email compromise is to enable multi-factor authentication (“MFA”) for all users in the organization. Here are the top 7 configurations that we recommend to harden and provide further visibility into your Office 365 environment. There are a variety of security features available within Office 365, but not all tenants have these applied by default. Microsoft’s Office 365 is an increasingly popular email solution for organizations that are choosing to migrate their email to the cloud.
#Microsoft onedrive email hack password#
These credentials can be sold to other threat actors or used to access other websites or internal resources through password reuse or single sign-on (“SSO”). Threat actors may also use this as a method of credential harvesting, where they collect the usernames and passwords of users who enter their credentials into the phishing site. This allows the threat actor to compromise other users within the organization who may be more likely to click on a phishing link if it comes from another user within the organization.

They will insert themselves in the conversation using the compromised account or a separate account with a look-alike domain and attempt to change banking details to redirect funds. Wire Fraud: Threat actors may hijack existing email threads related to financial transactions.In general, there are three common motives that threat actors have when compromising an Office 365 account:

Office 365 infrastructure is often a major target for cybercriminals, and business email compromise constitutes a large percentage of the incidents that Stroz Friedberg Incident Response Services investigates daily.

In a world where cybersecurity incidents cost companies billions of dollars each year, organizations must work to secure their digital infrastructure.
