Obsidian Discovers Successful Ransomware Attack Targeting SharePoint Online

Obsidian is a cybersecurity firm specializing in providing protection to individuals and businesses against all forms of cyber threats. Recently, they documented a successful ransomware attack on Sharepoint Online (Microsoft 365). The attack was carried out by hackers exploiting a Microsoft Global SaaS admin account, deviating from the standard compromised endpoint method. The victim sought assistance from Obsidian’s product and research team to investigate the attack, comprehensively understand the damage done, and resolve the situation’s outcomes. This article explores the attack in-depth, including the attacker’s methods, purposes, and potential consequences.

Description of the attack on SharePoint Online

The attackers used a new technique to exploit a Microsoft Global admin account and infiltrate SharePoint Online. Their use of this type of account suggests that they are highly experienced in cybersecurity, as it is much more challenging to gain access through an admin account. After infiltrating the online data storage system, the attackers installed ransomware on the system, which then started infecting the entire database.

Obsidian’s investigation into the cyberattack revealed strong evidence of the notorious Omega Group’s involvement. However, the victim’s identity was not disclosed to the public. If Omega is indeed the liable party, the data leak site could potentially disclose the victim’s identity if they do not fulfill the ransom demands. The Omega Group is one of the most notorious hacking groups in the world, known for their high level of sophistication, extensive experience, and previous attacks on major companies.

In just two hours, the attackers systematically eliminated over 220 administrators, leaving a trail of authority voids in their path. This was achieved in a highly organized and rapid manner, leaving little chance for the victim to detect the attack before significant damage had already been done. This significant blow to the system affected a wide range of business operations, leading to an investigation of all operations to identify the scope of the damage caused.

The stolen files had two purposes: first, to notify the victim about the theft and second, to establish a communication channel with the attackers. The attackers would try to negotiate payment to prevent the disclosure of sensitive information. They would threaten to publish sensitive and confidential information, such as intellectual property, sensitive data, and financial records, thus harming the victim’s reputation and causing significant financial loss.

Future scenarios and interest in using the capability again

The attackers have shown a strong interest in using this capability in future scenarios and have dedicated time to constructing automation, specifically for this attack. The fact that the attackers are now interested in using the capability again and developing it further is a clear indication that businesses should focus on taking proactive measures to safeguard their data continuously.

A growing trend in the hacking community is to rely more heavily on data theft instead of combining it with encryption. This trend has emerged due to the increasing vulnerability of encryption software, which is tempting attackers to shift their focus from encrypting to only stealing sensitive data. Attackers are now also looking to encrypt data if the victim has proactively attempted to secure their data.

Consequences of not fulfilling ransom demands

If the victim does not fulfill the ransom demands, the consequences are severe. The attackers could sell the stolen data on the dark web, potentially causing significant legal problems for the victim. This could lead to public relations damage, regulatory fines, intellectual property loss, and lawsuits.

To effectively manage risks, it is strongly recommended to enhance SaaS controls, mitigate excessive privileges, and revoke unauthorized integrations that may pose a high risk. Additionally, improving SaaS security posture through the use of multi-factor authentication, continuous monitoring, and thorough staff training can be helpful. The use of an external cybersecurity team can also provide a proactive measure against such attacks.

The SharePoint Online ransomware attack is a clear indication that businesses and individuals need to stay vigilant, collaborate with expert cybersecurity firms, and stay informed about cybersecurity developments. Hacking is an ever-evolving field, and businesses need to stay ahead of attackers to mitigate risks effectively. Proactive measures aimed at protecting sensitive information should always remain a top priority.

Explore more

The Hidden Cost of an Emotionally Polite Workplace

The modern office often presents a serene landscape of muted tones and measured responses, a carefully constructed diorama of professional harmony where disagreement is softened and passion is filtered. This environment, which prioritizes agreeableness above all else, poses a challenging question: Is a workplace that is perpetually calm and free of friction truly a productive one? The answer is often

Use AI to Reclaim 15 Hours Instead of Hiring

Today we’re speaking with Ling-yi Tsai, an HRTech expert with decades of experience helping organizations navigate change through technology. While she has worked with large corporations, her true passion lies in empowering entrepreneurs and consultants to harness the power of AI, not as a replacement for human ingenuity, but as a powerful partner. She’s here to discuss a revolutionary ideinstead

Will Your Hiring Survive the 2026 Stress Test?

Ling-yi Tsai, an HRTech expert with decades of experience helping organizations navigate technological change, joins us today to shed light on a critical issue: the hidden risks of using artificial intelligence in hiring. As companies lean more heavily on AI to sift through candidates, especially in a slow hiring market, they may be unintentionally creating systems that are both legally

Customer Satisfaction Is Key to Manufacturing Competitiveness

As a MarTech expert deeply passionate about the intersection of technology and marketing, Aisha Amaira has built a career helping businesses translate complex innovations into tangible customer value. With a rich background in CRM marketing technology and customer data platforms, she offers a unique perspective on how manufacturers can leverage smart technologies not just for internal gains, but to build

Trend Analysis: AI in Online Retail

In a marketplace defined by economic pressure and shifting priorities, the resilience of customer satisfaction in online retail points not to chance but to a calculated evolution driven by artificial intelligence. Retailers are increasingly turning to AI to navigate the demands of a new, more discerning consumer, one who prioritizes value above all else. This analysis will explore the current