HomeCII/OTResearchers Announce Detection of Initial Automated SaaS Ransomware Extortion Incident

Researchers Announce Detection of Initial Automated SaaS Ransomware Extortion Incident

Published on

spot_img

A group of cybercriminals has successfully carried out a ransomware attack without compromising an endpoint, according to Obsidian Security. Most enterprises focus on endpoint security mechanisms to address ransomware threats; however, the 0mega ransomware group managed to infiltrate a company’s SharePoint Online environment by obtaining a weakly secured service account belonging to one of the victim organization’s Microsoft Global administrators. The account could be accessed from the public internet and did not have multi-factor authentication (MFA) enabled. The threat actor then created an Active Directory user account called “0mega” and granted it global admin, SharePoint admin, and Exchange admin permissions, among others. The attacker subsequently used the credential to gain site collection administrator capabilities within the victim’s SharePoint Online environment and remove all other existing administrators.

The vulnerability shows that endpoint security alone often isn’t enough to keep an organization secure, especially for accessing and storing data in Software-as-a-Service (SaaS) applications. The attack was carried out without compromising an endpoint or using a ransomware executable, showing that organizations need to broaden their security approach to cover all endpoints, including SaaS. The threat actors extracted hundreds of files from the SharePoint libraries of the victim company and sent them to a Virtual Private Server (VPS) host in Russia. This was done using the publicly available node.js module called “sppull,” which helps developers interact with SharePoint resources using HTTP requests.

Once the exfiltration was complete, the attackers used another node.js module called “got” to upload thousands of text files to the company’s SharePoint environment, informing the victim company of the breach. Obsidian Security said it observed more attacks targeting enterprise SaaS environments in the past six months than the previous two years combined. Attackers are drawn to target SaaS environments as organizations are increasingly using them to store confidential and regulated information without implementing adequate endpoint security controls.

AppOmni has reported a 300% increase in SaaS attacks since March 2023, with the primary attack vectors being excessive guest user permissions, excessive object and field permissions, lack of MFA, and overprivileged access to sensitive data. A study by Odaseva found that 48% of respondents reported their organization had experienced a ransomware attack in the past year, with SaaS data being the target in over half (51%) of the attacks.

Organizations need to be proactive in managing their SaaS environment and ensure that the necessary controls and risk management tools are in place to minimize the impact of ransomware attacks. This is particularly necessary given that the threat actors are constantly evolving their techniques, as demonstrated by the 0mega ransomware group. It is critical to implement stringent security measures, including strong passwords, multi-factor authentication, and encryption to mitigate the risk of a ransomware attack or data breach.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...