The Microsoft and Google platforms are now used as a stronghold for hackers and their malicious activities.
As technology advances and facilitates us every day, cyber attackers and hackers promise to make everyone’s life difficult. Proofpoint, a cybersecurity company, claims that hackers have advanced their techniques and now use cloud computing software and online collaboration.
In one of Proofpoint’s blogs, Ryan Kalember, the head of EVP’s cybersecurity strategy, mentioned that last year more than 59 million malicious emails were distributed through these trusted platforms. It was a smart move, as Google and Microsoft are two of the most trusted platforms and they would never be suspected of being victims of these flaws.
More than 90 million messages have been sent through Google services, and what if I told you that 27% of them came from Gmail, one of the most popular email sites in the world? This was not limited to last year’s affairs, as the first half of this year sparked seven million malicious messages observed through Office 365.
To top it off, the volume of distressing content from these trusted services exceeds that of any botnet by 2020. Since these sites are highly tracked and are some of the most reliable platforms, the detection of these scams it took a long time to was a rather difficult task.
Hackers are, in fact, the worst, and among all that they can destroy, the worst is trying to steal email credentials and don’t be surprised when they inform you that this is exactly what these failures have achieved. It’s one of the oldest and smartest tricks in the book, as megacorporations can be broken by securing a single account.
Through different loopholes, over the past twelve months, criminals have tried to compromise about 95% of organizations through their cloud accounts. These criminals managed to get more than half of these organizations to suffer various adversities like file manipulation and email forwarding.
What these brains did was that once they got an account, they would start their bad cooking and email thousands of employees pretending to be the administration. These compelling emails took advantage of carefree victims as stated by Proofpoint.
While claiming the series of unfortunate events, Ryan Kemberly also took the liberty of informing us of the following details. Proofpoint’s analysis illustrates how attackers have understood Microsoft and Google as advantages and use their infrastructure to send malicious messages. Leveraging cloud-style tools, these hackers unify the high-level ransomware to compromise cloud accounts.
With this ordeal within reach, priority should be given to the security of people-centered mail.
Continue reading: Google has introduced a new feature for your Chrome browser to help users automatically change stolen passwords