Get a Pentest and security assessment of your IT network.

News

Threat Actors Use Credential Dumps, Phishing, Legacy Email Protocols to Bypass MFA and Breach Cloud Accounts Worldwide

A six-month study of major cloud service tenants, Proofpoint researchers observed massive attacks leveraging legacy protocols and credential dumps to increase the speed and effectiveness of brute force account compromises at scale. Attacks against Office 365 and G Suite cloud accounts using IMAP are difficult to protect against with multi-factor authentication, where service accounts and shared mailboxes are notably vulnerable. Phishing campaigns tricked recipients into revealing authentication credentials, providing attackers with additional avenues into corporate accounts. Most attacker logins originate from Nigerian IP addresses, followed by logins from Chinese IP addresses.”]

Source: https://www.darkreading.com/cloud/threat-actors-use-credential-dumps-phishing-legacy-email-protocols-to-bypass-mfa-and-breach-cloud-accounts-worldwide

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones