BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

MFA Bug Opens Door For Hackers To Attack Microsoft 365

New and heightened digital threats develop every day, and having standard security software may not be enough to protect your personal data and business from exploitation from malware attacks. Businesses across industries are vulnerable to new attacks, as many security software lags behind. Hackers find ways to work around the most common security platforms to find new ways into systems to gain access to all sorts of information, and the only way to ensure that you are as protected as possible is to work with an IT expert who knows how to take the preventative measures to keep up with the latest malware developments.

Microsoft 365 Bug

One of the latest bugs causing a lot of damage to businesses is a vulnerability to the Microsoft-based cloud office platform, Microsoft 365. This platform allows businesses to push their productivity almost entirely online, giving employees access to their data from literally anywhere in the world while still collaborating in real-time. The use of cloud platforms allowed businesses to stay productive during the 2020 shutdown. The use has grown exponentially in popularity as everything from law firms, doctors’ offices, and schools have shifted as much business as possible over to the virtual platforms.

Hackers recently exploited a bug present in the multi-factor authentication system for access into the Microsoft 365 platform, which meant that there was a somewhat easily accessible back door into the otherwise secure cloud system. There is a lot of damage done when a hacker can get access to your business or personal data. Information can be stolen or deleted, which could lead to costly repairs as you spend time re-collecting data or ensuring that your employees and clients are protected from additional attacks on their finances and identity based on the type of information accessed by the hackers.

System flaws happen, and typically patches are issued to fix bugs that may allow hackers into programs — especially in the case of well-funded, popular programs like those owned by Microsoft. However, that doesn’t mean that there isn’t a chance of an attack before that patch being issued. Also, if your employees aren’t receiving guidance on keeping up with regular updates and maintenance on their work computers, they could be putting everyone at risk as those updates are how patches are installed. A single point of access through an outdated computer can allow hackers to access all sorts of data.

In the case of the latest vulnerability that impacted Microsoft 365, the issue was present in the WS-Trust, an OASIS standard that delivers security extensions and is used to renew and validate security tokens, thus ensuring identity. A bug in this system could be disastrous, allowing for the easy manipulation of security tokens and identity, allowing hackers in. The attacker could easily access mail, files, data, contacts, and more — depending on the amount of information stored on the cloud.

Working with a strong IT support team is the best way to ensure that you are protected from the latest developments in malware. Keep your computers up to date and your employees knowledgeable on the best ways to stay protected by having a strong IT support team to rely on.

More Like This

AA22-216A: 2021 Top Malware Strains

Original release date: August 4, 2022 Summary Immediate Actions You Can Take Now to Protect Against Malware: • Patch all systems and prioritize patching known exploited vulnerabilities. • Enforce multifactor authentication (MFA). • Secure Remote Desktop Protocol (RDP) and other risky services. • Make offline backups of your data. • Provide end-user awareness and training …

AA22-216A: 2021 Top Malware Strains Read More »

Read More

Small Business Guide To Microsoft Azure Virtual Desktop

Small Business Guide To Microsoft Azure Virtual Desktop The business world is becoming increasingly digital. Since the COVID-19 pandemic began, many companies have moved into work-from-home situations, which has made remote and hybrid working environments more desirable and commonplace for workers across the country. The modern workforce is more flexible and mobile than ever, and …

Small Business Guide To Microsoft Azure Virtual Desktop Read More »

Read More

AA22-187A: North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector

Original release date: July 6, 2022 Summary The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury (Treasury) are releasing this joint Cybersecurity Advisory (CSA) to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to …

AA22-187A: North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector Read More »

Read More

AA22-181A: #StopRansomware: MedusaLocker

Original release date: June 30, 2022 Summary Actions to take today to mitigate cyber threats from ransomware: • Prioritize remediating known exploited vulnerabilities. • Train users to recognize and report phishing attempts. • Enable and enforce multifactor authentication. Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for …

AA22-181A: #StopRansomware: MedusaLocker Read More »

Read More

AA22-174A: Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems

Original release date: June 23, 2022 Summary Actions to take today: • Install fixed builds, updating all affected VMware Horizon and UAG systems to the latest versions. If updates or workarounds were not promptly applied following VMware’s release of updates for Log4Shell in December 2021, treat all affected VMware systems as compromised. • Minimize the …

AA22-174A: Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems Read More »

Read More

AA22-158A: People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices

Original release date: June 7, 2022 Summary Best Practices • Apply patches as soon as possible • Disable unnecessary ports and protocols • Replace end-of-life infrastructure • Implement a centralized patch management system This joint Cybersecurity Advisory describes the ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known …

AA22-158A: People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices Read More »

Read More