Office 365 May Be Popular Target for Bad Actors, But Difficult to Hit
A new Data Security Incident Response report from Baker & Hostetler shows that hackers are gravitating toward Office 365, possibly in the hopes of stealing contact information or reselling account access online.
May 01, 2020 at 11:30 AM
4 minute read
A takeover of Microsoft Office 365 accounts may be the first item on the to-do list of bad actors who have breached an organization's cybersecurity. Baker & Hostetler released its 2020 Data Security Incident Response Report on Thursday, indicating that ransomware is thriving with the help of stolen contact lists pilfered from underprotected accounts.
The report is based on information gleaned from 950 cyber incidents that Baker & Hostetler consulted on over the course of 2019. In 31% of the cases featured, bad actors initiated an Office 365 account takeover after the initial breach. Deployment of ransomware was the next most common step (24%), followed by the installation of malware (13%).
But why did an Office 365 takeover comprise the largest percentage of cases? Craig Hoffman, editor of the report and leader of Baker & Hostetler's digital risk advisory and cybersecurity team, said the additional contacts and email addresses stored inside an Office 365 account can provide hackers with their next targets for phishing or other schemes. But there's also the potential for immediate gratification as well.
"[Bad actors] run searches to look for invoices so they can trick people into wiring money out, and they are very effective at doing that. And then they sometimes sell off access to the account. … There are about 15 different flavors of what people do when they get access to your account," Hoffman said.
This could be of some concern to law firms or corporate legal environments, where Office 365 is often a popular choice. However, those accounts aren't low-hanging fruit if set up properly. Hoffman indicated that if multifactor authentication protocols are correctly installed, it would be very difficult for hackers to gain entry to accounts.
But even if Office 365 accounts are secured, ransomware doesn't seem like a preferable alternative for organizations to maneuver, especially as the number of dollar signs involved continues to increase. In the 2018 report, the average ransomware payment was $28,920, but that figure increased dramatically in 2019 to $302,539.
The sudden inflation could reflect the more aggressive tactics that purveyors of ransomware have begun to deploy. Hoffman pointed out that bad actors have typically used ransomware to cut an organization off from data in its system, with the access key held hostage. Now, hacker groups such as Maze are imposing additional pressure on victims by threatening to publish stolen data online.
The Texas-based firm of Baker Wotring experienced this firsthand last February after Maze hacked its "client site" and published such sensitive data as Health Insurance Portability and Accountability Act consent forms and fee agreements online. That same month, Maze also attacked three South Dakota law firms: Bangs McCullen; Lynn, Jackson, Shultz & Lebrun; and Costello Porter.
"We're seeing more groups steal data before they encrypt data," Hoffman said.
As for how organizations are faring in detecting ransomware and other intrusions, the report lists the average time that passes between the occurrence and discovery of an intrusion at around 90 days. The average number of days to contain a threat, however, increased from 10 days in 2018 to 14 days in 2019.
Both those numbers are more encouraging than statistics featured in a recent report by e-discovery provider Special Counsel, which placed the U.S. average for identifying a breach at 206 days, with the average containment time at 73 days. Still, confusion around figures such as these may be par for the course, since information technology personnel, for example, may view timelines differently than other members of an organization.
"What they don't account for is when their tools fail. A goalie is going to stop 99 out of 100 shots. In a security context, when they miss a shot and something gets past the goalie, it sits undetected for a long time," Hoffman said.
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllLaw Firms Mentioned
Trending Stories
- 1Uber Files RICO Suit Against Plaintiff-Side Firms Alleging Fraudulent Injury Claims
- 2The Law Firm Disrupted: Scrutinizing the Elephant More Than the Mouse
- 3Inherent Diminished Value Damages Unavailable to 3rd-Party Claimants, Court Says
- 4Pa. Defense Firm Sued by Client Over Ex-Eagles Player's $43.5M Med Mal Win
- 5Losses Mount at Morris Manning, but Departing Ex-Chair Stays Bullish About His Old Firm's Future
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250