OneDrive Common Threats
Overview
The following section goes over the common threats observed with OneDrive devices.
Data Exfiltration Through Unauthorized Sharing:
Attackers or malicious insiders can exfiltrate sensitive data by sharing files or folders outside the organization.
Indicators of Compromise (IoCs): Suspicious or unauthorized external sharing of sensitive files, often to unfamiliar domains or personal email accounts.
Ransomware Attacks on Synced Files:
Ransomware can infect local devices and propagate to OneDrive via file synchronization. Once infected, ransomware can encrypt OneDrive files, locking users out of their data.
IoCs: Sudden large-scale file modifications, unusual file extensions, or file access spikes.
Insider Threats:
Insider threats can come from employees intentionally or unintentionally leaking data, deleting critical files, or misusing sharing capabilities.
IoCs: Abnormal behavior such as mass file deletions, unsanctioned sharing of sensitive documents, or suspicious access to critical files during off-hours.
External Threats (Compromised Accounts, Malware Infected File Uploads):
Compromised Accounts: Attackers gain access to OneDrive through phishing, brute-force attacks, or credential stuffing, allowing them to steal or tamper with files.
Malware-Infected File Uploads: Users can accidentally or intentionally upload files containing malware, spreading it to other users or devices.
IoCs: Unexpected file uploads, user activity from unfamiliar locations or IP addresses, and unusual access patterns.
Last updated