Contact Us
Error: Contact form not found.
Contact Us
Error: Contact form not found.
Client Login
Select a platform below to log in

The digital landscape continually evolves, and with it, the sophistication and prevalence of cyber threats. One such pressing challenge is the Microsoft 365 (M365) account takeovers (ATO) surge. According to Sift’s Q3 2023 Digital Trust & Safety Index, ATO attacks have increased 354 percent year-over-year in 2023. The same report revealed that 22 percent of U.S. adults have fallen victim to ATO, affecting approximately 24 million households.
These figures highlight the need for enhanced security measures and proactive defense strategies. This article aims to provide insights into ATO attacks, prevailing tactics used by threat actors, and actionable ways to harden your M365 environment.
As our dependence on digital platforms grows, so does the risk to our data and online accounts from unauthorized access and exploitation. The cybersecurity firm Expel reported that identity-based attacks such as account compromise, account takeover, and access key theft accounted for 57 percent of all cybersecurity incidents identified in their first quarter threat report in 2023.
Understanding that account-based attacks account for over half of the 2023 cybersecurity incidents, the darknet is a thriving marketplace for stolen data and credentials. SpyCloud’s 2023 Annual Identity Exposure Report disclosed a trend: an annual analysis of recaptured data from the darknet showed a 72 percent password reuse rate for users exposed in two or more breaches in the last year, marking an 8-point increase from 64 percent the previous year. Notably, this habit of password reuse was identified as the primary culprit in the notable 23andMe data breach reported in October 2023.
A less discussed aspect of the ATO threat landscape is the perception of responsibility and notification. According to Sift’s Q3 2023 Digital Trust & Safety Index, 73 percent of consumers believe that brands are responsible for ATO attacks and should protect account credentials. Despite this expectation, the same report found that only 43 percent of victims were notified by companies when their information was compromised, highlighting a disconnect between consumer expectations and corporate practices in handling ATO incidents.
To defend against ATO attacks effectively, understanding the tactics employed by cybercriminals is crucial. Below is an overview of the most prevalent pre- and post-compromise methods.
Cybersecurity firm Expel reported that account compromise and new inbox rules designed to hide malicious activity are among the most popular hacking tactics 2023. Once threat actors successfully compromise email accounts, they create inbox rules to automatically delete or hide certain emails from the compromised account. This tactic reduces the chances of the victim or IT administrator spotting unusual activity.
Another common hacking tactic is the bypass of multifactor authentication (MFA). Attackers target Software as a Service (SaaS) applications like Okta and M365 by stealing session cookies, registering malicious OAuth applications, and authenticating using legacy protocols. This tactic represents a significant shift in threat actor tactics, with attackers moving away from authenticating using legacy protocols to bypass MFA in M365 and adopting frameworks to launch Attacker-in-the-Middle (AiTM) phishing campaigns.
Software vulnerabilities are often exploited to gain initial access. However, these security bugs leveraged by threat actors tend to be at least a year old, indicating organizations’ struggle to prioritize and patch vulnerabilities. Additionally, there’s a rise in insider threats, with misuse of cloud storage and file synchronization services like Google Drive and OneDrive.
While no security control is absolute, organizations can take steps to proactively harden their environments and reduce exposure. Per Microsoft’s playbook, Organizations should adopt a review frequency of the following:
If suspicious activity is detected, organizations must adhere to internally adopted Incident Response Playbooks, which should include, at a minimum:
While the strategies mentioned earlier for monitoring and responding to suspicious activities in Microsoft 365 are essential, organizations should also consider adopting additional security measures such as FIDO2 and certificate-based authentication to further harden credentialed access within your environment. More information regarding FIDO2 can be found at https://fidoalliance.org/how-f….
The increasing prevalence of ATO attacks underscores the critical importance of comprehensive and evolving security measures. Organizations must stay informed about the latest threats, understand the tactics employed by cybercriminals, and implement robust, proactive defense strategies, ensuring that policies and security controls reflect the current environment and best practices. Best practices should include, at a minimum, adopting strong password policies or implementing FIDO2 and certificate-based authentication, regularly reviewing alerts and user-created rules, and ensuring transparency from service providers. This approach underscores the shared responsibility between organizations and their partners in hardening your environment.