Obsidian Discovers Successful Ransomware Attack Targeting SharePoint Online

Obsidian is a cybersecurity firm specializing in providing protection to individuals and businesses against all forms of cyber threats. Recently, they documented a successful ransomware attack on Sharepoint Online (Microsoft 365). The attack was carried out by hackers exploiting a Microsoft Global SaaS admin account, deviating from the standard compromised endpoint method. The victim sought assistance from Obsidian’s product and research team to investigate the attack, comprehensively understand the damage done, and resolve the situation’s outcomes. This article explores the attack in-depth, including the attacker’s methods, purposes, and potential consequences.

Description of the attack on SharePoint Online

The attackers used a new technique to exploit a Microsoft Global admin account and infiltrate SharePoint Online. Their use of this type of account suggests that they are highly experienced in cybersecurity, as it is much more challenging to gain access through an admin account. After infiltrating the online data storage system, the attackers installed ransomware on the system, which then started infecting the entire database.

Obsidian’s investigation into the cyberattack revealed strong evidence of the notorious Omega Group’s involvement. However, the victim’s identity was not disclosed to the public. If Omega is indeed the liable party, the data leak site could potentially disclose the victim’s identity if they do not fulfill the ransom demands. The Omega Group is one of the most notorious hacking groups in the world, known for their high level of sophistication, extensive experience, and previous attacks on major companies.

In just two hours, the attackers systematically eliminated over 220 administrators, leaving a trail of authority voids in their path. This was achieved in a highly organized and rapid manner, leaving little chance for the victim to detect the attack before significant damage had already been done. This significant blow to the system affected a wide range of business operations, leading to an investigation of all operations to identify the scope of the damage caused.

The stolen files had two purposes: first, to notify the victim about the theft and second, to establish a communication channel with the attackers. The attackers would try to negotiate payment to prevent the disclosure of sensitive information. They would threaten to publish sensitive and confidential information, such as intellectual property, sensitive data, and financial records, thus harming the victim’s reputation and causing significant financial loss.

Future scenarios and interest in using the capability again

The attackers have shown a strong interest in using this capability in future scenarios and have dedicated time to constructing automation, specifically for this attack. The fact that the attackers are now interested in using the capability again and developing it further is a clear indication that businesses should focus on taking proactive measures to safeguard their data continuously.

A growing trend in the hacking community is to rely more heavily on data theft instead of combining it with encryption. This trend has emerged due to the increasing vulnerability of encryption software, which is tempting attackers to shift their focus from encrypting to only stealing sensitive data. Attackers are now also looking to encrypt data if the victim has proactively attempted to secure their data.

Consequences of not fulfilling ransom demands

If the victim does not fulfill the ransom demands, the consequences are severe. The attackers could sell the stolen data on the dark web, potentially causing significant legal problems for the victim. This could lead to public relations damage, regulatory fines, intellectual property loss, and lawsuits.

To effectively manage risks, it is strongly recommended to enhance SaaS controls, mitigate excessive privileges, and revoke unauthorized integrations that may pose a high risk. Additionally, improving SaaS security posture through the use of multi-factor authentication, continuous monitoring, and thorough staff training can be helpful. The use of an external cybersecurity team can also provide a proactive measure against such attacks.

The SharePoint Online ransomware attack is a clear indication that businesses and individuals need to stay vigilant, collaborate with expert cybersecurity firms, and stay informed about cybersecurity developments. Hacking is an ever-evolving field, and businesses need to stay ahead of attackers to mitigate risks effectively. Proactive measures aimed at protecting sensitive information should always remain a top priority.

Explore more

Trend Analysis: Maritime Data Quality and Digitalization

The global shipping industry is currently grappling with a paradox where massive investments in high-end software often result in negligible improvements to the bottom line because the underlying data is essentially unreadable. For years, the narrative around maritime progress has been dominated by the allure of autonomous hulls and hyper-intelligent algorithms, yet the reality on the bridge and in the

Trend Analysis: AI Agents in ERP Workflows

The fundamental nature of enterprise resource planning is undergoing a radical transformation as the age of the passive data repository gives way to a dynamic environment where autonomous agents manage the heaviest administrative burdens. Businesses are no longer content with software that merely records what has happened; they now demand systems that anticipate needs and execute complex tasks with minimal

Why Is Finance Moving Business Central Reporting to Excel?

Finance leaders today are discovering that the rigid architecture of an enterprise resource planning system often acts more as a cage for their data than a springboard for strategic insight. While Microsoft Dynamics 365 Business Central serves as a formidable engine for transaction processing, many organizations are intentionally migrating their primary reporting workflows toward Microsoft Excel. This transition represents a

Dynamics GP to Business Central Migration – Review

Maintaining an aging on-premise ERP system in 2026 feels increasingly like trying to navigate a modern high-speed railway using a vintage steam engine’s schematics. For decades, Microsoft Dynamics GP, formerly known as Great Plains, served as the bedrock for mid-market American enterprises, providing a sturdy, if rigid, framework for accounting and inventory management. However, as the industry moves toward 2029—the

Why Use Statistical Accounts in Dynamics 365 Business Central?

Managing a modern enterprise requires more than just tracking the movement of dollars and cents across various general ledger accounts during a fiscal period. Financial clarity often depends on non-monetary metrics like employee headcount, physical floor space, or the total volume of customer interactions to provide context for the raw numbers. These metrics, known as statistical accounts, allow controllers to