Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began. Credit: Robertiez / Getty Images The COVID-19 pandemic has pushed companies to adapt to new government-mandated restrictions on workforce movement around the world. The immediate response has been rapid adoption and integration of cloud services, particularly cloud-based collaboration tools such Microsoft Office 365, Slack and videoconferencing platforms. A new report by security firm McAfee shows that hackers are responding to this with increased focus on abusing cloud account credentials.After analyzing cloud usage data that was collected between January and April from over 30 million enterprise users of its MVISION Cloud security monitoring platform, the company estimates a 50% growth in the adoption of cloud services across all industries. Some industries, however, saw a much bigger spike–for example manufacturing with 144% and education with 114%.The use rate of certain collaboration and videoconferencing tools has been particularly high. Cisco Webex usage has increased by 600%, Zoom by 350%, Microsoft Teams by 300% and Slack by 200%. Again, manufacturing and education ranked at the top. While this rise in the adoption of cloud services is understandable and, some would argue, a good thing for productivity in light of the forced work-from-home situation, it has also introduced security risks. McAfee’s data shows that traffic from unmanaged devices to enterprise cloud accounts doubled. “There’s no way to recover sensitive data from an unmanaged device, so this increased access could result in data loss events if security teams aren’t controlling cloud access by device type.”Cloud threats increasedAttackers have taken notice of this rapid adoption of cloud services and are trying to exploit the situation. According to McAfee, the number of external threats targeting cloud services increased by 630% over the same period, with the greatest concentration on collaboration platforms. For its report, the company split suspicious login attempts and access into two categories: excessive usage from anomalous location and suspicious superhuman. Both have seen a similar surge and growth pattern over the time period analyzed.Excessive usage from anomalous location. This category is for successful logins from locations that are unusual given the organization’s profile, followed by the user accessing large quantities of data or performing a high number of privileged tasks.Suspicious superhuman. This category is for logins by the same user from two geographically distant locations over a short period of time — for example, if the same user logs into one service from one country and then minutes later access a service while using an IP address from a different country.The transportation and logistics, education and government institutions have seen the largest increases of threat events detected in their cloud accounts. For transportation and logistics, the rise in threats was as high as 1,350%, followed by education with 1,114%, government with 773%, manufacturing with 679%, financial services with 571% and energy with 472%.The top ten sources for external attacks against enterprise cloud accounts by IP address location have been Thailand, USA, China, India, Brazil, Russia, Laos, Mexico, New Caledonia and Vietnam.“Many of these attacks are likely opportunistic, essentially ‘spraying’ cloud accounts with access attempts using stolen credentials,” the McAfee researchers said. “However, several prominent industries are often targeted by external threat actors–in particular, financial services. These targeted attacks are often found to have a source in either China, Iran or Russia.” Credential stuffing attacks on the riseThe frequency of credential stuffing attacks, where criminals use lists of leaked or stolen username and password combinations to gain access to accounts, has grown significantly in recent years. Often the used credentials come from third-party data breaches and the attackers attempt to exploit the bad but still common practice of password reuse.In a report released this year, security and content delivery company Akamai revealed that it observed 85.4 billion credential abuse attacks against organizations worldwide between December 2017 and November 2019. Of those, 473 million attacks targeted the financial sector.To better protect their employees’ cloud accounts and prevent unauthorized access, McAfee recommends that companies implement a cloud-based secure gateway so employees don’t need to route their traffic through a VPN or use a cloud access security broker platform with strict policies for device checks and data controls. If employees need to use their personal devices to access corporate SaaS applications, conditional access should be placed on sensitive data. Related content news Top cybersecurity product news of the week New product and service announcements from Bedrock Security, GitGuardian, Legit Security, Nametag, and Cybereason and Observe By CSO staff Mar 29, 2024 70 mins Generative AI Security news analysis Thousands of servers hacked due to insecurely deployed Ray AI framework Ray deployments are not intended to connect to the internet, but AI developers are doing so anyway and leaving their servers vulnerable. By Lucian Constantin Mar 28, 2024 4 mins Vulnerabilities news Cisco: Security teams are ‘overconfident’ about handling next-gen threats Tooling complexity and generative AI may harm many companies’ security posture. By Jon Gold Mar 28, 2024 3 mins Security brandpost Sponsored by Microsoft Security Iran’s evolving influence operations and cyberattacks support Hamas Understanding how Iranian and Iran-affiliated threats traverse 3 distinct phases may help identify vulnerabilities and attack vectors. By Microsoft Security Mar 28, 2024 5 mins Security PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe