Response to Phished 365 Users and Prevention Methods for Token Theft from Phishing in Microsoft Office 365 Accounts.
Phishing with token theft (fake MS logon with security code capture) has been a common attack to gain access to accounts for several years.
Token theft is when an adversary uses an 'man in the middle' system to grab a token Microsoft sends back to the user and emulate it on their own system. It is especially common from by attackers intending to use wire fraud to intercept funds, targeting people involved real estate and corporate banking transactions.
Initial response when a user has been phished (this is only a starting point):
- Immediately change the user's password.
- Immediately click revoke all sessions in Entra ID on the user's profile. (Password alone does not boot the attacker)
- Review the user's Applications listed in Entra ID, these can be used for continuous access or data export.
- If the phished account has extended administrative access, including but not limited to Global Admin, you must perform a top-to-bottom password reset, revoke all sessions, and applications review, and verify any anomalous login locations, this is where senior level experienced Microsoft 365 admins must be involved.
Prevention Methods:
- Yubikey MFA on every login, shortened timeout for token expiration.
- [Entra ID P1 license required] Create conditional access policies restricting users to only log in from Azure/Entra Joined Devices.
- [Entra ID P2 license required] Create a conditional access policy where Any Medium or High Risk sign-in is blocked.
- End User Education
Note: This is an early draft version, check back for additional updates in the future