November 13

Eliminate Account Takeovers with AI-Powered Email and Access Security

0  comments

image

These automated tools and credential lists make it easy to launch credential stuffing and brute force attacks. Corporate email accounts that are not protected by additional defenses may be compromised by these attacks. 

MFA isn’t enough

While multifactor authentication (MFA) is an important layer of defense, it isn’t foolproof against credential compromise and other attacks like session hijacking or MFA fatigue attacks. Sophisticated phishing kits can now replicate legitimate login pages in real time, capturing both credentials and MFA codes to gain immediate access. Even more advanced attacks use adversary-in-the-middle (AiTM) proxies to intercept authentication exchanges and reuse them to impersonate victims.

Moreover, MFA does not address the broader ecosystem of stolen credentials, reused passwords, and compromised third-party integrations that feed into ATO campaigns. Attackers that get beyond MFA can access accounts and blend in with network activity as legitimate users. This allows them to access cloud applications, exfiltrate data and launch ransomware campaigns. A stealthy attacker can establish persistence and remain inside a network for months.

Companies must combine email impersonation protection and measures like MFA with additional defenses like adaptive access controls, continuous identity threat detection, certificate-based authentication to prevent MFA bypass, and least-privilege enforcement that blocks lateral movement. Barracuda SecureEdge Access in conjunction with Barracuda Email Protection is the most advanced solution to eliminate account takeover attacks.

Complete protection against ATO attacks

Barracuda SecureEdge Access adds continuous device posture checks, integrated web filtering and real-time threat intelligence to stop zero-day attacks. It also delivers secure SaaS access, comprehensive oversight of privileged accounts and rapid isolation of compromised endpoints to contain ransomware. Here’s how this works to protect a Microsoft 365 account:

  1. An authorized user attempts to log in to Microsoft 365 from an authorized device configured with Barracuda SecureEdge Access. 
  2. The SecureEdge Access Agent on the device detects the login request to Microsoft 365. The agent redirects this request to the SecureEdge Access service. 
  3. The SecureEdge Access service checks several contextual factors, including device health, network location, time of day, and user behavior. 
  4. If the request passes these checks, the login request is forwarded to Microsoft 365. 
  5. The Microsoft 365 tenant for the user’s domain is already configured to permit only those login attempts that come from Barracuda SecureEdge Access service.
  6. Once Microsoft 365 approves the login, the user is authenticated and can proceed. 

Any attempt to bypass these security checks, even with working credentials, results in something like this: 


Tags


You may also like

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

Get in touch

Name*
Email*
Message
0 of 350