Obsidian Discovers Successful Ransomware Attack Targeting SharePoint Online

Obsidian is a cybersecurity firm specializing in providing protection to individuals and businesses against all forms of cyber threats. Recently, they documented a successful ransomware attack on Sharepoint Online (Microsoft 365). The attack was carried out by hackers exploiting a Microsoft Global SaaS admin account, deviating from the standard compromised endpoint method. The victim sought assistance from Obsidian’s product and research team to investigate the attack, comprehensively understand the damage done, and resolve the situation’s outcomes. This article explores the attack in-depth, including the attacker’s methods, purposes, and potential consequences.

Description of the attack on SharePoint Online

The attackers used a new technique to exploit a Microsoft Global admin account and infiltrate SharePoint Online. Their use of this type of account suggests that they are highly experienced in cybersecurity, as it is much more challenging to gain access through an admin account. After infiltrating the online data storage system, the attackers installed ransomware on the system, which then started infecting the entire database.

Obsidian’s investigation into the cyberattack revealed strong evidence of the notorious Omega Group’s involvement. However, the victim’s identity was not disclosed to the public. If Omega is indeed the liable party, the data leak site could potentially disclose the victim’s identity if they do not fulfill the ransom demands. The Omega Group is one of the most notorious hacking groups in the world, known for their high level of sophistication, extensive experience, and previous attacks on major companies.

In just two hours, the attackers systematically eliminated over 220 administrators, leaving a trail of authority voids in their path. This was achieved in a highly organized and rapid manner, leaving little chance for the victim to detect the attack before significant damage had already been done. This significant blow to the system affected a wide range of business operations, leading to an investigation of all operations to identify the scope of the damage caused.

The stolen files had two purposes: first, to notify the victim about the theft and second, to establish a communication channel with the attackers. The attackers would try to negotiate payment to prevent the disclosure of sensitive information. They would threaten to publish sensitive and confidential information, such as intellectual property, sensitive data, and financial records, thus harming the victim’s reputation and causing significant financial loss.

Future scenarios and interest in using the capability again

The attackers have shown a strong interest in using this capability in future scenarios and have dedicated time to constructing automation, specifically for this attack. The fact that the attackers are now interested in using the capability again and developing it further is a clear indication that businesses should focus on taking proactive measures to safeguard their data continuously.

A growing trend in the hacking community is to rely more heavily on data theft instead of combining it with encryption. This trend has emerged due to the increasing vulnerability of encryption software, which is tempting attackers to shift their focus from encrypting to only stealing sensitive data. Attackers are now also looking to encrypt data if the victim has proactively attempted to secure their data.

Consequences of not fulfilling ransom demands

If the victim does not fulfill the ransom demands, the consequences are severe. The attackers could sell the stolen data on the dark web, potentially causing significant legal problems for the victim. This could lead to public relations damage, regulatory fines, intellectual property loss, and lawsuits.

To effectively manage risks, it is strongly recommended to enhance SaaS controls, mitigate excessive privileges, and revoke unauthorized integrations that may pose a high risk. Additionally, improving SaaS security posture through the use of multi-factor authentication, continuous monitoring, and thorough staff training can be helpful. The use of an external cybersecurity team can also provide a proactive measure against such attacks.

The SharePoint Online ransomware attack is a clear indication that businesses and individuals need to stay vigilant, collaborate with expert cybersecurity firms, and stay informed about cybersecurity developments. Hacking is an ever-evolving field, and businesses need to stay ahead of attackers to mitigate risks effectively. Proactive measures aimed at protecting sensitive information should always remain a top priority.

Explore more

How Will NatWest and Endava Transform Merchant Payments?

The rapid evolution of digital commerce has placed unprecedented pressure on traditional financial institutions to provide more than just basic transaction processing for their business clients. As small and medium-sized enterprises seek more integrated, intelligent ways to manage their cash flow and customer interactions, NatWest’s merchant-payment division, Tyl, has entered into a significant strategic collaboration with Endava. This partnership is

Debunking Common Myths of Workplace Sexual Harassment

Professional environments are currently navigating a complex transformation where the traditional boundaries of conduct are being scrutinized through the lens of empirical data and modern legal standards. Statistical evidence gathered as recently as 2024 indicates that nearly half of all women and roughly one-third of men have experienced some form of harassment or assault within a professional context, suggesting that

PHP Patches Critical Memory Flaws in Image Processing

Security researchers recently identified a pair of severe memory-safety vulnerabilities within the core image-processing capabilities of PHP, the programming language that currently powers a massive majority of active web servers. These critical flaws, specifically targeting the widely used functions getimagesize and iptcembed, were discovered by security researcher Nikita Sveshnikov and represent a profound risk to the global web infrastructure. By

Why Is Pacific Plastics Facing a California Labor Lawsuit?

The intricate landscape of California labor regulations often presents a significant challenge for industrial manufacturers who must balance high-volume production with strict statutory compliance. This reality has come to the forefront as Pacific Plastics, Inc. faces a class action lawsuit filed in the Orange County Superior Court, documented under Case Number 30-2026-01558517-CU-OE-CXC. The litigation, initiated by the law firm Blumenthal

Why Is Manufacturing the Top Target for Costly Ransomware?

The global industrial landscape currently faces a paradox where the same digital innovations driving productivity have also created a massive, highly profitable surface area for sophisticated cyber extortion. While ransomware accounts for approximately 12% of the total volume of cybersecurity claims in the manufacturing sector, it is responsible for a staggering 90% of the associated financial losses. This massive disparity