The latest news from online publication SecurityWeek doesn't look particularly promising for businesses that use Microsoft 365. A massive hacking operation has been discovered, targeting business email accounts using a network of over 130,000 infected computers. Cybersecurity experts believe that a group of hackers linked to China is behind the attack, raising concerns for businesses of all sizes.

Eagle 102.3 logo
Get our free mobile app

How the Hacking Attack Works

This large-scale attack takes advantage of any older, less secure login methods that some organizations still use. Many businesses rely on Microsoft 365 for email and communication, but not all of them have updated their security settings. Things like two-factor authentication and monthly password updates can keep systems running smoothly and prevent hacks. The hackers in this instance are using something called “password spraying.” Essentially, they try commonly used passwords across many accounts until they find a match they can exploit.

Credit: Canva
Credit: Canva
loading...

To make matters worse, these attacks can somehow avoid triggering two-factor authentication (2FA), which is usually a business's best defense against hacking. This is because they exploit “non-interactive sign-ins” and Basic Authentication — older login methods that don’t require users to manually enter credentials. Basically, if businesses haven’t switched to more secure login processes, their accounts could be at risk.

What This Means for Businesses in Iowa, Illinois, and Wisconsin

Small to medium-sized businesses in the Midwest are particularly vulnerable to these attacks. Many rely on Microsoft 365 for their day-to-day operations. That's perfectly fine. However, they may not have a dedicated IT team to monitor their online security. If an attacker were to gain access to a business’s email account, they could steal sensitive information, disrupt operations, and launch additional attacks from inside the business itself. This could lead to the dreaded ransomware attacks and full system lock-outs.

Credit: Canva
Credit: Canva
loading...

Microsoft is working to phase out outdated authentication methods, but many businesses have yet to make this crucial transition. This means that many companies across the Tri-States still face an immediate risk.

What Can Businesses Do Now?

Cybersecurity experts are urging businesses to take action as soon as possible. Here are some key steps:

  • Disable Basic Authentication: If your business is still using older login methods, switch now.
  • Enable Multi-Factor Authentication (MFA): This adds extra security and makes it harder for hackers to gain access.
  • Monitor Login Activity: If capable, check sign-in logs for unusual activity.
  • Train Employees: This is the easiest and most effective way to limit a hacker's options. Make sure staff members know how to recognize phishing attempts and avoid the use of "weak" passwords.

This Microsoft 365 hack should serve as a major wake-up call for businesses across the United States, especially those that don't have the bandwidth to deal with a cyber-security issue of this magnitude. Cyberattacks are becoming more and more sophisticated. Companies need to stay ahead by keeping their security measures up to date. If your business relies on Microsoft 365, now is the time to review your security settings and protect your data before it’s too late. Hey, better safe than sorry.

LOOK: The biggest scams today and how you can protect yourself from them

Using data from the BBB Scam Tracker Annual Risk Report, Stacker identified the most common and costly types of scams in 2022.

KEEP READING: These are the top 6 scams connected to the pandemic

More From Eagle 102.3