Source |
TechRepublic |
Identifiant |
5193988 |
Date de publication |
2022-06-16 15:44:57 (vue: 2022-06-16 16:08:08) |
Titre |
\'Potentially dangerous\' Office 365 flaw discovered (Recyclage) |
Texte |
>Proofpoint says the piece of functionality allows ransomware to encrypt files stored on Microsoft SharePoint and OneDrive.
|
Notes |
|
Envoyé |
Oui |
Condensat |
365 >proofpoint allows dangerous discovered encrypt files flaw functionality microsoft office onedrive piece potentially ransomware says sharepoint stored |
Tags |
Ransomware
|
Stories |
|
Move |
|
Source |
The Hacker News |
Identifiant |
5187454 |
Date de publication |
2022-06-16 03:05:49 (vue: 2022-06-16 11:06:59) |
Titre |
A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage |
Texte |
A "dangerous piece of functionality" has been discovered in Microsoft 365 suite that could be potentially abused by a malicious actor to ransom files stored on SharePoint and OneDrive and launch attacks on cloud infrastructure.
The cloud ransomware attack makes it possible to launch file-encrypting malware to "encrypt files stored on SharePoint and OneDrive in a way that makes them unrecoverable |
Notes |
|
Envoyé |
Oui |
Condensat |
365 abused actor attack attacks been cloud could dangerous discovered encrypt encrypting feature file files functionality hackers has help hold hostage infrastructure launch makes malicious malware microsoft office onedrive piece possible potentially ransom ransomware sharepoint stored suite them unrecoverable way |
Tags |
Ransomware
Malware
|
Stories |
|
Move |
|
Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2022-06-17 15:06:57 |
(Déjà vu) Dangerous Microsoft Office 365 Functionality That Can Store Ransom Files On SharePoint And OneDrive (lien direct) |
Proofpoint has discovered a potentially dangerous piece of functionality in Office 365 or Microsoft 365 that allows ransomware to encrypt files stored on SharePoint and OneDrive in a way that makes them unrecoverable without dedicated backups or a decryption key from the attacker. The research focused on two of the most popular enterprise cloud apps – […] |
Ransomware
|
|
|