Share this article

Latest news

With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low

Copilot in Outlook will generate personalized themes for you to customize the app

Microsoft will raise the price of its 365 Suite to include AI capabilities

Death Stranding Director’s Cut is now Xbox X|S at a huge discount

Outlook will let users create custom account icons so they can tell their accounts apart easier

Severe security breaches on Office 365 and Azure accounts

3 min. read

Published onMay 20, 2021

published onMay 20, 2021

Share this article

Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more

Key notes

There is no stopping the future and, as much as we all wanted a more futuristic way to store our data and conduct business, we have all become to fear how easy it is for it to be accessed by external entities.

The complexity of vastness of the storage clouds makes the detection and repelling of threatening events more and more difficult.

How can you tell if your security has been bypassed?

How can you tell if your security has been bypassed?

According to the specialists atVectra AI, there are a few signs that indicate the fact that security for our Microsoft 365 or Azure has been compromised.

External Teams access and non-authorized, suspicious mail forwarding should be the first red flags when it comes to your, or your company’s cloud security. This could easily mean that an attack has already begun.

Regularly checking what accounts are part of the team inOffice 365is an excellent way to make sure that an external account has been already added.

This type of activity could indicate that a malicious third party has added an account under their control.

Another sign that you should keep your eyes open for is risky Office 365 Exchange operations, which could point to an attacker that is controlling Exchange in order to gain access to specific data or further attack progression.

Also, peculiar Azure AD actions may imply that attackers are already escalating privileges and also performing admin-level operations, after the account takeover.

Office 365 accounts that are downloading or sharing files and folders at a volume that was higher than normal, which could indicate a third party is using either SharePoint, or OneDrive to download functions to exfiltrate data, is another sign.

Tell the difference between friend and foe

Taking into consideration the examples above, you can understand that every activity that is being detected isn’t necessarily of malicious nature, which is why it’s paramount to have the right data before we take action.

It’s all about being able to determine and, also, tell the difference between what’s considered to be normal activity for your environment and what could be a potential issue that needs to be addressed.

The securityissues that users deal with while using Office 365are many, which should be an even bigger reason to keep both eyes wide open when we feel something’s not right.

Have you ever felt like your Microsoft Cloud security has been hacked? Tell us all about it in the comments section below.

More about the topics:Microsoft Azure,Office 365

Alexandru Poloboc

Tech Journalist

With an overpowering desire to always get to the bottom of things and uncover the truth, Alex spent most of his time working as a news reporter, anchor, as well as TV and radio entertainment show host.

A certified gadget freak, he always feels the need to surround himself with next-generation electronics.

When he is not working, he splits his free time between making music, gaming, playing football, basketball and taking his dogs on adventures.

User forum

0 messages

Sort by:LatestOldestMost Votes

Comment*

Name*

Email*

Commenting as.Not you?

Save information for future comments

Comment

Δ

Alexandru Poloboc

Tech Journalist

With a desire to always get to the bottom of things and uncover the truth, Alex spent most of his time working as a news reporter.