Proofpoint identifies Microsoft 365 functionality that opens new cloud-based attack vectors [TechSpot]
View Article on TechSpot
The exploit relies on a four-step attack chain that begins with a specific user’s identity being compromised. The malicious actor uses the individual’s credentials to access a user’s SharePoint or OneDrive accounts, change versioning settings, and then encrypts the files multiple times, leaving no unencrypted version of the compromised files….