Adding to your point, giving another scenario -
There was a cybersecurity incident in Office 365 where attackers managed to steal or hijack session cookies, allowing them to impersonate legitimate users. To handle the situation, we first took immediate action by logging out all active sessions and disabling any compromised accounts. We then went through the O365 and Azure AD logs to find out how the attackers gained access and which method they used, such as cross-site scripting (XSS) or man-in-the-middle (MITM) attacks.
For remediation, we revoked all session cookies and forced a logout for everyone. We also strengthened our security by enabling Multi-Factor Authentication (MFA) and setting up Conditional Access policies to limit access based on factors like device or location. We made sure to apply any necessary security patches, updated our cookie settings (HttpOnly, Secure, SameSite), and tightened browser security.
We also monitored the system closely using O365 Advanced Threat Protection (ATP) to detect any further suspicious activity. Lastly, we educated users on best practices for secure browsing and reviewed our incident response plan to make sure we were better prepared for future threats.
------------------------------
Pankaj Kumar,
Sr. Project Manager
United Flow Technologies
[email protected]https://www.linkedin.com/in/pankajkm/------------------------------
Original Message:
Sent: Jul 21, 2024 08:56:21 AM
From: Neil Baal
Subject: O365 Account Compromise Containment/Recovery
Thought I would add some real world experience to this,
We have seen O365 accounts being compromised and have learned that the account needs to have both password reset (changed on next logon) and crucially that all O365 sessions are revoked as we have seen threat actor continue within the compromised account as they have an active authentication token.
The above approach ensures that the compromised account is fully clear of the threat actor and the user now has a new password.
Thanks,
Neil Baal
Group IT Security Manager
------------------------------
Neil Baal
Group IT Security Manager
Unknown
------------------------------