33
How Attackers Exploit Office 365 Vulnerabilities A Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer Netwrix Corporation

Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Embed Size (px)

Citation preview

Page 1: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

How Attackers Exploit Office 365 Vulnerabilities

A Hacker Explains

Liam ClearyCEO/OwnerSharePlicity

Jeff MelnickSystems EngineerNetwrix Corporation

Page 2: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Agenda

• Office 365 Hacked

• Office 365 Attacks

• Netwrix Auditor Solutions

• Q&A Session

• Prize Drawing

Page 3: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Steps

AttackSimulationExploitation Protection

Page 4: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Is Office 365 Vulnerable?

Yes No

Page 5: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Has Office 365 Been Hacked?

• Office 365 OWA Security Vulnerability – January 2018

– https://community.spiceworks.com/topic/2105786-office-365-owa-security-vulnerability

• Widespread, Brute-Force, Cloud-to-Cloud Attacks Hit Office 365 Users – July 2017

– https://www.skyhighnetworks.com/cloud-security-blog/skyhigh-discovers-a-targeted-brute-force-attack-on-enterprise-customers/

• Microsoft Office 365 hit with massive Cerber ransomware attack – June 2016

– https://www.scmagazine.com/microsoft-office-365-hit-with-massive-cerber-ransomware-attack-report/article/529295/

Page 6: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Office 365 Breach Flow

Login & Access Service AccessFile

DownloadsSite Traversal

Mail AccessMail RulesCreate / Read

/ Update / Delete

API Access

Page 7: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Exploitation

Page 8: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Exploiting Office 365

Phishing Brute-forcePassword

MaliciousURLs

*MFA bypass

* https://twitter.com/rkalember/status/1017082306853392384

Page 9: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Brute-force Password

Identify web formparameters

Intercept trafficusing Proxy

Retrieve badresponse

Construct commandfor Brute-force

Page 10: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Malicious URLs

<!DOCTYPE html>

<html lang=“en”>

<head></head>

<body>

Click the Malicious<a href=“https://bit.ly/malicious”>link</a>

</body>

</html>

<!DOCTYPE html>

<html lang=“en”>

<head>

<base href=“https://bit.ly”>

</head>

<body>

Click the Malicious<a href=“malicious”>link</a>

</body>

</html>

Page 11: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Attack Simulation

Page 12: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Why Simulate an Attack?

People are theweakest link

Test currentsystems

End-usertraining

Page 13: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Attack Simulation Prerequisites

• Office 365 License that includes Office 365 Threat Intelligenceo Can be purchased as a separate add-on

• Utilize Exchange Online

• Assigned as Global Administratoro If not Global Administrator, specific permissions to Security & Compliance Center

• Enabled Multi-Factor Authentication for Office 365 Users

Page 14: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Attack Simulation Types

Spear-phishing(Credential Harvesting)

Password-spray Brute-force Password(Dictionary Attack)

Page 15: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Office 365Attack Simulator

Page 16: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Protection

Page 17: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

What Does Microsoft Provide?

Identity and accessmanagement

Threatprotection

Informationprotection

Securitymanagement

Security Graph

Page 18: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Risk Assessment

• Identify and define Office 365 scoped services

• Review existing Security documentation and guidance

• Gather existing configuration and security data

• Review assessment data, define risks and actions

• Define current Security posture based on assessment

• Perform remedial actions, based on assessment results and guidance

Page 19: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Security Controls

• Core Protectionso Exchange Online Protection

o Exchange Advanced Threat Protection

o Advanced Security Management / Cloud App Security

o Threat Intelligence

o Advanced Data Governance

o Azure Active Directory Authentication

o Multi-factor Authentication

o Office 365 Secure Score

o Conditional Access

o Mobile Device Management

• Content Protectionso Information Rights Management

o Azure Information Protection

o Data Loss Prevention

Page 20: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Takeaways

Page 21: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Takeaways

• Office 365 License that includes Office 365 Threat Intelligence

• Enabled Multi-Factor Authentication for Office 365 Users

• Execute Attack Simulator

• Enable ALL or AS MANY Security controls as possible

• Provide End User Training

Page 22: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Demonstration

Netwrix Auditor

Page 23: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Netwrix Auditor for Office 365

Netwrix Auditor for Active Directory

Netwrix Auditor for Windows File Servers

Netwrix Auditor for Windows Server

Netwrix Auditor for Exchange

Netwrix Auditor for SQL Server

Netwrix Auditor for SharePoint

Netwrix Auditor for NetApp

Netwrix Auditor for EMC

Netwrix Auditor for VMware

Netwrix Auditor Platform

Netwrix Auditor for Azure AD

Netwrix Auditor for Oracle Database

Netwrix Auditor Unified Platform

• Exchange Online administrative changes, changes to

mailboxes, mail users, groups, permissions, policies,

and management roles

• Non-owner mailbox access auditing

• SharePoint Online and OneDrive for Business

configuration, security, and content changes, and

data access events

• Changes to Azure AD groups, users, passwords,

roles, applications, service principals, devices,

contacts, and more

• Logon auditing

• Changes to farm configuration, user content and

security, permissions, group membership, security

policies

• Read access auditing

Page 24: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

All Exchange Server Changes

Page 25: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Exchange Online Mailbox Permissions Changes

Page 26: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Behavior Anomalies

Page 27: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Interactive Search

Page 28: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Alerts on Suspicious Activity

Page 29: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Alerts on Threat Patterns

Page 30: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Useful links

Webinars: join our upcoming webinars and watch the recorded sessions

• netwrix.com/webinars

• netwrix.com/webinars#featured

Upcoming webinar: Join Liam Cleary and Jeff Melnick to learn the core tenets of SharePoint securityhttps://try.netwrix.com/the_3_pillars_of_sharepoint_security

Page 31: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Questions?

Page 32: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

Prize Drawing

Page 33: Hacker Explains How Attackers Exploit Office 365 ... · How Attackers Exploit Office 365 Vulnerabilities Hacker Explains Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer

www. .com

Thank you!

Liam ClearyCEO/OwnerSharePlicity

Jeff MelnickSystems EngineerNetwrix Corporation