(5 Min read)
The following case study details a case where SECMON1 was engaged to conduct a security review of an organisation’s O365 environment. The organisation had received some information from clients which caused them to suspect they had been breached.
It was clear from the outset that a breach had occurred. A significant amount of sensitive information had been used to commit fraud through a process of altering the banking details on invoices. The extent of the fraud, was over $400,000.
The O365 security review (SECMON1 O365 Health Check) includes an examination of all aspects of O365 including Exchange online, SharePoint and OneDrive. The review is conducted in three stages;
In summary there were some key security configuration issues which had resulted in the compromise. They were;
1. Activity monitoring – There was no monitoring of activity to any extent. In this attack, monitoring would have detected the attack within hours of it occurring
2. Multi Factor Authentication (MFA) was not used for all accounts, including some user accounts and some accounts with global administrator privileges
3. Passwords – A number of staff were provided a common password when onboarded and not required to reset the password on first login.
4. Inactive accounts – There were many active accounts for inactive users
The attack on the client was a situation we were all too familiar with unfortunately.
1. The attacker gained access to a user account. The attack was mounted from Nigeria.
2. The attack identified additional accounts where MFA was not enabled including some accounts which had with global administrator privileges. These accounts were also subsequently compromised.
3. Additional accounts were created by the attacker, including some with admin privileges.
4. The attacker gained access to key user accounts which contained sensitive financial information in the form of invoices which had been sent to clients.
5. The attacker implemented some forwarding rules which resulted in them receiving intelligence to aid the fraud.
6. The attacker created rules to redirect certain email correspondence so that the victim was unaware of any future correspondence which might expose the fraud.
7. The attacker sent fraudulent communications to the victim (or a third-party payor) asking for payment. The original invoices had been changed to alter the payment banking details.
• If activity monitoring had been in place the attack would have been detected on the first day
• Daily monitoring of activity was implemented. Interestingly there were additional attack attempts over the first few weeks of monitoring. None were successful.
• If MFA had been in place for the compromised accounts it would have made it very difficult for the attack to occur
• MFA was implemented for all accounts, including accounts with admin privileges
• Blocking mail forwarding rules would have made the fraud more difficult for the attacker to gain key information
• Mail forwarding rules were blocked for all accounts
• A complete review of all mail rules was undertaken, with many rules created by the attackers being deleted.
• The Onboarding and offboarding processes were not documented or communicated adequately to the service desk team resulting in constant variations and shortcuts.
This included;
o New accounts being provisioned with poor security
o Unnecessary additional O365 licensing fees for the client
• Onboarding and offboarding processes were rewritten and the service desk team were retrained. Simple checklists were also used to ensure consistent processes.
• Additionally, an account clean-up was undertaken resulting in many accounts, which should have been inactive, being decommissioned.
• Accounts created by the attackers were also decommissioned
Christopher McNaughton
Director | SECMON1
EM christopher.mcnaughton@secmon1.com
PH 0428 183 095
www.SECMON1.com
The Rialto, 525 Collins St. Melbourne
Act now before the data breach storm reaches you. Contact us today.
In an intriguing development, recent trends in Australia's retail sector—namely, a decline in men's underwear…
If you work in the Finance Department of your company your email account might…
Information Theft - What is the Risk? Our research has shown that around 68%…
The Impacts of a Cyber Attack In your personal life and as an employee,…
The Data Governance Watershed "You've been breached!" These are words none of us want to…
The recent increase in employees working remotely, combined with the migration to platforms such as…