Account Takeover

The mechanics and motive of cloud account takeovers are the same as for on-prem account takeovers. In this scenario, the attacker gains access to a user or application account and uses this to gain access to more accounts and information. There are numerous ways to detect an account takeover:

  • Login Location: conditional access can be used to prevent users logging in from 'suspicious' locations i.e. places where you do not do business.

  • Failed Login Attempts: mass failed login attempts can be a sign of attempted account takeover.

  • Lateral Phishing Emails: phishing emails originating from inside the domain can indicate a compromised account.

  • Malicious OAuth, SAML, or OpenID Connect Connections: attacker could create a fake app that could require read, write and send permissions for SaaS offerings like Office 365. If this is granted user consent, it can be manipulated by the attacker.

  • Abnormal File Sharing and Downloading: unusual sharing or download behaviour from users can indicate account takeover.

Last updated