Security News > 2022 > June > Microsoft Office 365 feature can help cloud ransomware attacks
Security researchers are warning that threat actors could hijack Office 365 accounts to encrypt for a ransom the files stored in SharePoint and OneDrive services that companies use for cloud-based collaboration, document management and storage.
A ransomware attack targeting files on these services could have severe consequences if backups aren't available, rendering important data inaccessible to owners and working groups.
Researchers at cybersecurity company Proofpoint note in a report today that the success of the attack relies on abusing the "AutoSave" feature that creates cloud backups of older file versions when users make edits.
The only prerequisite for encrypting SharePoint and OneDrive files is to compromise Office 365 accounts, which is easily done through phishing or malicious OAuth apps.
The trick to finish the file locking stage quicker and make recovery more difficult is to reduce the version numbering limit and encrypt all files more than that limit.
With a file version limit set to "1," when the attacker encrypts or edits the file twice, the original document will no longer be available through OneDrive and cannot be restored.
News URL
Related news
- Ransomware attackers hop from on-premises systems to cloud to compromise Microsoft 365 accounts (source)
- Ransomware gang using stolen Microsoft Entra ID creds to bust into the cloud (source)
- Embargo ransomware escalates attacks to cloud environments (source)
- Microsoft Office 2024 now available for Windows and macOS users (source)
- Microsoft: Ransomware Attacks Growing More Dangerous, Complex (source)
- A Hacker's Era: Why Microsoft 365 Protection Reigns Supreme (source)
- JPCERT shares Windows Event Log tips to detect ransomware attacks (source)
- Ransomware attack forces UMC Health System to divert some patients (source)
- DOJ, Microsoft seize 107 domains used in Russia's Star Blizzard phishing attacks (source)
- Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (source)