Proofpoint identifies Microsoft 365 functionality that opens new cloud-based attack vectors
TechSpot
JUNE 18, 2022
The exploit relies on a four-step attack chain that begins with a specific user's identity being compromised. The malicious actor uses the individual's credentials to access a user's SharePoint or OneDrive accounts, change versioning settings, and then encrypts the files multiple times, leaving no unencrypted version of the compromised files.
Let's personalize your content