Over the past months, threat actors have targeted Office 365 and G Suite cloud accounts using the IMAP protocol to bypass multi-factor authentication (MFA).
Experts at Proofpoint conducted an interesting study of massive attacks against accounts of major cloud services, The experts noticed that attackers leverage legacy protocols and credential dumps to increase the efficiency of massive brute force attacks.
“Attacks against Office 365 and G Suite cloud accounts using IMAP are difficult to protect against with multi-factor authentication, where service accounts and shared mailboxes are notably vulnerable.” reads the study published by Proofpoint. “At the same time, targeted, intelligent brute force attacks brought a new approach to traditional password-spraying, employing common variations of the usernames and passwords exposed in large credential dumps to compromise accounts.”
The experts analyzed over one hundred thousand unauthorized logins across millions of monitored cloud user-accounts, below key findings from the study:
The attacker’s primary goal is to carry out internal phishing, especially when the initial target does not have the access needed to transfer money or data. The access to a cloud account could be exploited by attackers for lateral movements and to expand footholds within an organization via internal phishing and internal BEC. Experts observed that compromised accounts are also used to launch external attacks.
Giving a look at the sources of the attacks, most of them come from Nigerian IP addresses (40%), followed by Chinese IP addresses (26%).
According to the study, IMAP was the most abused legacy protocol. IMAP is a legacy authentication protocol that bypasses multifactor authentication (MFA). Experts pointed out that these attacks avoid account lock-out and appear as isolated failed logins and for this reason, they are hard to detect.
Below other data provided by the experts:
The experts observed a large number of IMAP-based password-spraying campaigns between September 2018 and February 2019. Proofpoint reported that 10% of active user accounts in targeted tenants were hit and 1% of targeted user accounts were successfully breached.
The attackers leveraged a botnet composed of thousands of hijacked network devices (i.e. routers, servers) to launch the attacks.
“These hijacked devices gained access to a new tenant every 2.5 days on average during a 50-day period,” continues Proofpoint.
China was the source for the vast majority of the IMAP-based attacks (53%), followed by Brazil (39%) and the United States (31%).
Most of the attacks (63%) originated from Nigerian IP addresses, followed by South African infrastructure (21%), and the United States via VPNs (11%).
“This study demonstrates the increasing sophistication of threat actors around the world who are leveraging brute force methods, massive credential dumps, and successful phishing attacks to compromise cloud accounts at unprecedented scale. Service accounts and shared mailboxes are particularly vulnerable while multifactor authentication has proven vulnerable.” concludes the study.
“Attackers parlay successful compromises into internal phishing attacks, lateral movement in organizations, and additional compromises at trusted external organizations.”
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – IMAP, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows flaws to its Known Exploited…
Ivanti addressed two Endpoint Manager Mobile (EPMM) software vulnerabilities that have been exploited in limited…
Microsoft Patch Tuesday security updates for May 2025 addressed 75 security flaws across multiple products, including…
Fortinet fixed a critical remote code execution zero-day vulnerability actively exploited in attacks targeting FortiVoice…
Interlock Ransomware 's attack on a defense contractor exposed global defense supply chain details, risking…
Marks and Spencer (M&S) confirms that threat actors stole customer data in the ransomware attack…
This website uses cookies.