Since launching Cloud Response last year, our Security Operations Center (SOC) has seen a steady increase in cloud attacks. This spring, the pace has kicked up even more. In fact, currently, our SOC is seeing nine cloud attacks for every attack at the endpoint level.
The reason is simple: The cloud offers a broader and easier attack surface than traditional on-premises hacking. Threat actors simply need to sign in the same way an ordinary user would.
These identity-based attacks are simple and relatively low-tech. Attackers can harvest credentials from dumps from compromised services or send phishing emails to trick users into giving up credentials. What’s more, although single sign-on (SSO) exists to ease friction for users, it also makes an attacker’s life easier. With SSO, an attacker only needs to compromise one set of credentials to access a whole set of services.
The uptick in identity-based attacks has caused us to look for better ways to detect them, stop them, and clean up after them. And that’s why today we’re announcing a pioneering new feature of Cloud Response for Microsoft 365 that enables all of the above: Identity Response for Azure AD. This new feature enhances the security of the Microsoft environment and any third-party applications that are connected via Azure SSO authentication.