Office 365 Accounts Compromised via ATO Attacks Used in BEC Scams

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,176
Office 365 accounts are targeted and compromised in account takeover (ATO) attacks, which cybercriminals later use for a variety of nefarious purposes ranging from spear-phishing and BEC attacks to malvertising campaigns.

As explained by Barracuda Networks' researchers in a report published today, more than 1.5 million malicious and spam emails were delivered by threat actors using roughly 4,000 accounts compromised via ATO during March 2019 within a single month.

Also, while analyzing ATO attacks targeting Barracuda customers, the researchers discovered that 29 percent of the monitored organizations had their Office 365 accounts infiltrated.

Once the Office 365 accounts were successfully hacked into, the scammers added malicious mailbox rules to hide their activity and deleted the malvertising, phishing, and spam emails sent from the account in "34 percent of the nearly 4,000 compromised accounts."

Barracuda's research team found that suspicious logins originating from Chinese IP addresses were the most encountered while investigating the Office 365 ATO attacks with almost a quarter of the total number of attempts, with attackers also using servers located in Brazil (9%), Russia (7%), Netherlands (5%), and Vietnam (5%).
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top