Hardening your Office 365 configuration: Best practices for preventing email account takeovers
Office 365 email account takeovers show no signs of
slowing down in 2022. Organizations responding to these
attacks often must deal with compromised credentials,
unauthorized wire transfers, and expensive remediation.
How do account takeovers happen?
In the first phase, the cybercriminal sends a phishing email, often requesting the employee use the link provided to review a document. The link takes the employee to a website that requests his or her credentials. Once an employee provides credentials, the cybercriminal can start to leverage access to the account in several ways.
How does an account takeover put you at risk?
With access, the cybercriminal can search for information on wire instructions, electronic payments, or vendor invoicing. They may engage in other reconnaissance—monitoring traffic to the inbox, watching the relationships between the parties, and observing the details of their communications— to determine how to steal funds. Theft may occur when the criminal issues fraudulent payment instructions, impersonates a vendor, or diverts the employee’s direct deposit.
If the employee has no responsibility for payments, the cybercriminal will use the inbox as a platform to phish other employees. Access to the organization’s address book often provides details about whom to target in finance or accounts
payable. Using a legitimate email account, the cybercriminal
appears to be an employee and can defeat safeguards
such as flagging of external emails. And of course the
compromised inbox may have years’ worth of emails that
include sensitive data.
A cybercriminal who uses the account to communicate with
other parties, posing as the employee, will usually create
forwarding rules to cover their tracks, while the employee
remains unaware that communication is taking place.
Email account takeovers are one form of business email
compromise (BEC). For more on BEC generally and how to
protect your organization, see Business email compromise best practices.
How to harden your O365 configuration
To help reduce the frequency and severity of these attacks,
O365 administrators should take the following steps to
mitigate the risk of a successful attack in the Office 365
environment:
• require multi-factor authentication
• limit or disable remote access
• use Microsoft’s Secure Score
• manage message forwarding
• turn on audit logging and mailbox auditing