Cyber Attackers are now leveraging Google and Microsoft to spread malicious content

Microsoft and Google platforms are now being used as a fort for hackers and their malign activities.

As technology advances and makes every day easier for us, cyber attackers and hackers vow to make life difficult for everyone. Proofpoint, a cybersecurity company, claims that hackers have advanced their techniques and are now using cloud computing and online collaboration software.

In one of the blogs of Proofpoint, Ryan Kalember, the head of the EVP Cybersecurity strategy mentioned that last year over 59 million malign emails were distributed using these trusted platforms. This was a smart move since Google and Microsoft are two of the most trusted platforms and one would never suspect them to be the victim of such misdemeanors.

More than 90 million messages were sent out through Google services and what if I told you that 27% of them were sourced through Gmail, one of the world's most popular email sites? This wasn't a matter confined to last year's affairs as the first half of this year brought about seven million malicious messages observed through none other than office 365.

To top it all, the volume of the distressing content from these trusted services exceeds that of any botnet in 2020. Since these sites have a large following and are some of the most reliable platforms, the detection of these ill-doings took exceedingly long and was quite a difficult task.

Cyber Hackers are indeed the worst and among all that they can destroy, the worst is trying to steal email credentials, and do not be surprised when I inform you that this is exactly what these reprobates have accomplished. It is one of the oldest and smartest tricks in the book as Mega-corporations can be shattered by securing a single account.

Through different loopholes, over the last 12 months, criminals sought to compromise around 95% of organizations through their cloud accounts. These criminals managed to make more than half of these organizations suffer several adversities like file manipulation and email forwarding.

What these masterminds did was that once they had secured an account, they would then start their evil cooking and email thousands of employees pretending to be from the administration. These convincing emails took advantage of unsuspecting victims as stated by Proofpoint.

While stating the series of unfortunate events, Ryan Kemberly also took the liberty of informing us of the following details. The analysis conducted by Proofpoint illustrates how attackers have grasped Microsoft and Google as their front and are using their infrastructure to consign malign messages. By leveraging cloud-style instruments, these hackers unify heightened ransomware to compromise cloud accounts.

With such an ordeal at hand, precedence should be given to securing people-concentrated mail safety.


Read next: Google has introduced a new feature for its Chrome browser to help users automatically change the stolen passwords
Previous Post Next Post