Here's How the Microsoft Cloud Gets Hacked

One culprit: Bad passwords.

July 26, 2019

4 Min Read
Password
Shutterstock

By Kelly Sheridan

From Dark Reading

Even companies that previously said “no” to cloud are migrating their services and resources to cloud-based infrastructure. As they do, many are concerned about maintaining the cloud’s rapid update pace and how the new paradigm exposes them to new types of security threats.

Moving to the cloud is one challenge; knowing how to secure it afterward is another.

Morowczynski-Mark_Microsoft.jpg

Microsoft’s Mark Morowczynski

“One of the things I recognize, and certainly see for myself, is [that] keeping up with changes at cloud scale is challenging, to say the least,” says Mark Morowczynski, principal program manager at Microsoft. “Organizations go from ‘never cloud,’ to ‘maybe cloud,’ to ‘cloud is an important business component,’ and many are trying to figure out how to determine that risk.”

It’s a challenge from an administrative and operations perspective, he continues, adding that “ultimately the cloud is a huge paradigm shift for people.” From Amazon Web Services to Office 365, there are countless applications that reside in the cloud. Identity protection, security settings and vendor management are all different to track — and all affect organizational risk.

“We found that many organizations are struggling with what to do once they’re in the cloud, and how to secure their cloud tenant,” says Trimarc CTO Sean Metcalf. We’re seeing a lot of customers are moving to a work-from-anywhere model, and one of the things with that is there are lots of good fundamentals and best practices we want people to be doing correctly.”

A common concern among businesses is, “I don’t know what I don’t know,” he continues. Many organizations simply don’t understand the risks, and they’re moving into the cloud unsure of what they’re doing. The challenge is compounded for those using Microsoft, Google, and Amazon cloud services, he adds, as security controls are often in different cloud environments.

At this year’s Black Hat USA, Aug. 3-8 in Las Vegas, Morowczynski and Metcalf will discuss threats specific to Microsoft cloud services in their talk, “Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD).” The goal, Metcalf says, is to help people understand how to secure Microsoft cloud environments, common mistakes made, and which configurations could make them vulnerable.

“Our approach is very much focused on mitigating real world attacks,” Metcalf adds.

One of the threats the duo plan to discuss is password spraying, which Morowczynski says is one of the most common attacks leveraged against Microsoft users. Historically, people have a “predictable pattern” in password reset policies: They change every 30 days and often switch their password to whatever month it is; for example, “July2019!”

Attackers recognize this behavior, he continues, so they keep a list of user names and test the password against each one. If the system uses a legacy protocol that can’t support MFA, the attacker will likely succeed.

“Good fundamentals really go a long way in protecting against attacks,” Morowczynski notes, recommending companies abandon legacy authentication in favor of MFA.

Of course, “this isn’t a new issue,” Metcalf points out. “The on-prem environment password spray is something that’s been pretty prevalent. It’s just the fact that where the data is, what attackers want to get to, is located in the cloud.”

As attackers pivot to the cloud, it’s easier for them because the default configuration leaves these services available to the internet at large, he explains. Organizations want their users to be productive from anywhere; with that access, an intruder could bounce around from …

… a few different IP addresses to attempt to break into an account.

Metcalf describes a customer that had no MFA configured on any accounts, enabling an attacker to password-spray any environment. Because cloud and on-premises systems had the same passwords, they could break into one account, connect to a VPN, and gain access to a corporate environment.

“That’s an extension of how bad an attack like that can be,” Metcalf says.

The two hope attendees take away a better understanding of security risks inherent to cloud services, how attackers exploit misconfigurations, and where they might be vulnerable. While their content is focused on Microsoft, some attack and defense topics apply to other providers.

Kelly Sheridan is the staff editor at Channel Futures’ sister site, Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial services. You can follow her on Twitter @kellymsheridan.

Read more about:

MSPs
Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like