TMCnet News

Skyhigh Networks Reveals Sophisticated Cyber Attack Campaign on Enterprise Office 365 Users
[July 20, 2017]

Skyhigh Networks Reveals Sophisticated Cyber Attack Campaign on Enterprise Office 365 Users


Skyhigh Networks, the world's leading Cloud Access Security Broker (CASB) platform, today announced it has detected and remediated one of the first examples of an operationalized cloud-to-cloud threat in the enterprise. Attackers used popular cloud service platforms to conduct a persistent attack to log into corporate Office 365 accounts. Known as a 'brute force' attack, Skyhigh has been tracking the campaign since early 2017, with targets including high-level employees at multiple Fortune 2000 organizations.

Cloud services are on path to become the standard for enterprise IT solutions. Office 365 has taken a dominant role as the productivity solution of choice for enterprise data; 58.4 percent of all sensitive corporate data in the cloud is stored in Office 365. This new cloud-to-cloud attack points to an IT security blind spot and anticipates the 'new normal' of cloud-based attacks.

"Sensitive data has already moved to cloud applications, so it is only natural sophisticated attacks are following," said Slawomir Ligier, SVP of Engineering, Skyhigh. "While companies traditionally have invested extensively in perimeter security, those without a dedicated cloud security solution will lack visibility and control for a growing category of attacks. Enterprise cloud providers secure their infrastructure, but the ultimate responsibility to control access to sensitive data lies with the customer."

Anatomy of the Attack

Earlier this year, Skyhigh's CASB platform detected and defended against a 'slow-and-low' pattern of coordinated attacks on high-value targets, including more than 100,000 failed Office 365 logins from 67 IP addresses and 12 networks. The attempts all came from instances hosted on cloud service platforms and targeted 48 different organizations. The duration and measured pace of the attacks suggest a determined effort and the desire to avoid detection. Within each organization, the attackers targeted a small number of senior employees across multiple departments.

A brute force attack typically refers to repeated guesses at an account passwrd. In this case, the attackers tried logging in with different versions of employees' Office 365 usernames, suggesting they may already possess some combination of employee names and passwords and were seeking valid Office 365 usernames for data access or spear phishing campaigns. Password data could have been obtained in a database breach of a service like Yahoo or a phishing attack; studies have shown nearly half of online users reuse passwords across accounts. If the attackers confirmed an accurate Office 365 username with a correct reused password, they could successfully log into corporate Office 365 applications and potentially additional cloud service accounts.



Detection and Impact

Skyhigh's CASB detected and defended against the attack by correlating Office 365 API login data across employees and customers. The platform's Threat Protection feature analyzes cloud-user activity with cross-tenant machine learning algorithms to identify correlated anomalous behavior indicative of persistent threats that would have otherwise flown under the radar.


Skyhigh brought the attacks to the attention of targeted customers and have been working to help clients audit all cloud services in use, enforce secure login policies and provide a comprehensive picture of threat intelligence across cloud environments.

Additional Information

For more stories and to join the cloud security conversation, follow Skyhigh on The Cloud Security Blog, Facebook, LinkedIn and Twitter.

About Skyhigh

Skyhigh Networks, the world's leading Cloud Access Security Broker (CASB), enables enterprises to safely adopt cloud services, while meeting their security, compliance and governance requirements. With more than 600 enterprise customers globally, Skyhigh provides organizations the visibility and management for all their cloud services, including enforcement of data loss prevention policies; detecting and preventing internal and external threats; encrypting data with customer-controlled keys; and implementing access-control policies. Headquartered in Campbell, Calif., Skyhigh Networks is backed by Greylock Partners, Sequoia Capital (News - Alert), Thomvest Ventures, Tenaya Capital and other strategic investors. For more information, visit http://www.skyhighnetworks.com.


[ Back To TMCnet.com's Homepage ]