Blog | G5 Cyber Security

Threat Actors Use Credential Dumps, Phishing, Legacy Email Protocols to Bypass MFA and Breach Cloud Accounts Worldwide

A six-month study of major cloud service tenants, Proofpoint researchers observed massive attacks leveraging legacy protocols and credential dumps to increase the speed and effectiveness of brute force account compromises at scale. Attacks against Office 365 and G Suite cloud accounts using IMAP are difficult to protect against with multi-factor authentication, where service accounts and shared mailboxes are notably vulnerable. Phishing campaigns tricked recipients into revealing authentication credentials, providing attackers with additional avenues into corporate accounts. Most attacker logins originate from Nigerian IP addresses, followed by logins from Chinese IP addresses.”]

Source: https://www.darkreading.com/cloud/threat-actors-use-credential-dumps-phishing-legacy-email-protocols-to-bypass-mfa-and-breach-cloud-accounts-worldwide

Exit mobile version