Currently, Microsoft 365 users are unable to authenticate and access cloud services. Users with cached logins are not affected by this issue; however, new authentication attempts are only 50% successful.
Update as of 9:48 AM - Thursday, September 27
All Control Hub services have been restored.
Cisco Talos researchers announced this past week that Russian hackers were able to amass a collection of over 500,000 malware-infected consumer-grade routers. Dubbed the VPNFilter, this malware could have a significant impact on the operability of routers around the world by shutting down networks, blocking traffic, or collecting mass amounts of user information. There is also the potential to use all of the compromised devices in a single attack against a strategic target.
There's a new social engineering tactic on the loose affecting cloud email accounts like Microsoft Office 365. The ransomware attack, hidden beneath a "new Microsoft anti-spam service," tricks users into accepting the service, thereby providing the cyberattacker with access to their email account. It is at that time that all emails and their attachments are encrypted in real time and requested to pay a ransom to recover the data.
As of 12:36 PM EST, our SE CleanMail provider, Proofpoint, was experiencing intermittent email delays. As a result, SE CleanMail clients might have experienced a disruption in the receipt of emails from external senders.
Today at approximately 11:30am EST, users of Microsoft Office 365 began to experience delays and/or the nondelivery of external emails.
https://www.syseng.com/it-consulting-services/se-policyadvisor/Here at Systems Engineering (SE), we continue to see businesses impacted by ransomware; this creates a disruption to business and in some cases, a data breach.
Last week, a client of ours received the phishing email below requesting wire transfer account information. Fortunately for them, they did not fall for it. In the actual email, real names and real emails were used and the recipient, "Jane", was likely to have the information the scammer sought.
File sharing applications such as DropBox, ShareFile, Google Docs, and OneDrive are being utilized more frequently. Although these applications provide convenience, especially when sharing large files, they can create additional risks for your network.