Organizations urged to secure Microsoft 365 against malicious activity

In response to recent malicious activity identified in a federal civilian agency鈥檚 Microsoft 365 audit logs, the Cybersecurity and Infrastructure Security Agency and FBI July 12 released to help health care and other critical infrastructure organizations detect similar malicious activity and secure their cloud environments. The agencies recommend implementing audit logging and other preventive measures, reporting suspicious activity to them and contacting Microsoft for mitigation actions due to the cloud-based infrastructure affected.
鈥淢icrosoft has linked this malicious activity to a China-based threat group tracked as 鈥楽torm-0558,鈥欌 said John Riggi, AHA鈥檚 national advisor for cybersecurity and risk. 鈥淭he revelation of this threat also coincides with the reported move by the Administration to limit Chinese companies鈥 access to U.S. cloud providers. This threat also demonstrates that once again no organization is immune from cyberthreats, including the federal government, and that cloud environments are not necessarily more secure than on-premises environments. It is essential that individual organizations configure cloud security controls as enumerated in the alert and closely monitor their cloud applications for anomalous behavior.鈥
For more information on this or other cyber and risk issues, contact Riggi at . For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity.