Go back

How to Use Email Behavior as Account Compromise Signals

In a previous blog post, I made the case that the typical approach to email threat detection and response is missing a critical element – containment. Simply relying on surface-level detections that monitor incoming and outgoing traffic isn't enough to safeguard the resources and data accessible via an email account. In this post, we'll focus on a few practical examples of email behaviors that Material has a unique ability to pinpoint that may indicate an account compromise.

Engineering
February 24, 2024
5m read
5m read
5m listen
5m watch
5m watch
two circles in a green background
speakers
speakers
speakers
authors
Ivan Dwyer
participants
No items found.
share

In a previous blog post, I made the case that the typical approach to email threat detection and response is missing a critical element – containment. Simply relying on surface-level detections that monitor incoming and outgoing traffic isn't enough to safeguard the resources and data accessible via an email account. In this post, we'll focus on a few practical examples of email behaviors that Material has a unique ability to pinpoint that may indicate an account compromise.

In light of two recent incidents at Microsoft, where nation state attackers compromised email accounts, there’s a heightened interest in examining protections across your entire cloud email infrastructure. The first event, from a Chinese group dubbed Storm-0558, was a sophisticated attack that took advantage of a unique sequence of events to forge a valid access token for an Outlook email account. The more recent attack this week, from a Russian group named Midnight Blizzard, was a persistent attack that took advantage of weak authentication controls on a number of test email accounts then used as a pivot point to gain access to a number of high-profile executive email accounts. Both scenarios highlight that the sophistication of modern attacks lies in the ability to remain obscured from common detections for as long as possible.

Monitoring for account takeovers is a fickle beast given that a compromised account effectively operates as an insider. It’s difficult for systems to distinguish between normal business tasks, irregular use, and malicious activities. The inherent risk and potential consequences of elevated access and unwanted data exposure make it tempting to implement restrictive controls across all systems, however, one may find pushback from the business and an overwhelming number of low-risk alerts from normal workforce use.

Striking the right balance between security and productivity is an ongoing effort where the right set of tradeoffs isn't always obvious. The following examples are intended to highlight potential account takeover scenarios that are worthy of attention, and how Material helps address them.

Email Auto-Forwarding

Auto-forwarding is a common tactic used by attackers to discreetly monitor communications and steal sensitive information after gaining access to an email account. This is done by setting up a rule that automatically forwards emails to an external account. The insidious nature of this method lies in its ability to go unnoticed for extended periods. The forwarding rule operates silently, allowing the attacker to maintain a persistent presence in the compromised account.

Material offers advanced monitoring capabilities specifically designed to detect changes in email settings, including the creation of new auto-forwarding rules. By setting up an event subscription with Material, administrators can be instantly alerted about any modifications to forwarding rules. These alerts can be configured to be delivered via Slack, email, or webhook.

When an unauthorized forwarding rule is detected, incident response teams can quickly investigate and take appropriate action, such as revoking the rule and locking the account. This proactive approach not only stops data exfiltration in its tracks but also minimizes further lateral movement.

create subscription content image

Failed Message Retrieval Events

Multi-Factor Authentication (MFA) is a crucial security measure, but it also serves as a valuable indicator of potential account breaches. When there are multiple failed attempts to bypass MFA, it often signals that an unauthorized user is trying to gain access.

Material’s novel approach to data protection applies MFA directly to email messages containing sensitive data, such as Personally Identifiable Information (PII), Protected Health Information (PHI), and Payment Card Information (PCI). This targeted approach ensures that emails with critical data require additional verification – valid users can still access the messages they need with a simple auth flow, but attackers are significantly slowed down.

Material logs all attempts to access these protected messages, and can be configured to fire off an alert for any failed retrieval attempts. Such failed attempts are significant red flags, indicating that someone may be trying to access sensitive information without proper authorization.

access request content image


Password Reset Attempts

Email accounts are a form of identification, and attackers frequently target them to gain elevated access to downstream systems and applications. Once an attacker compromises an email account, a typical strategy is to change passwords for as many services as possible linked to that account. This tactic not only grants them broader unauthorized access but also effectively locks out the legitimate owner of the account.

In this context, password reset attempts are a signal for an account compromise. Material addresses this scenario proactively, detecting emails from service providers that indicate email confirmation. As we do with emails that contain sensitive data, we apply a layer of authentication to follow through with the request. This extra layer of security means that any attempt to reset a password via a compromised email account will require additional verification, which an attacker is less likely to bypass.

This strategy effectively adds a significant speedbump for attackers. If an unauthorized user tries to reset passwords, the MFA requirement on the confirmation email can serve as an immediate red flag. It not only prevents the attacker from easily continuing their malicious activities but also alerts the user and the security team of the suspicious activity.

Password Reset attempt caught in the Material dashboard
protection content image

Takeaways

These examples further stress the importance of an effective containment strategy around email accounts. Detecting suspicious behaviors is as important as detecting suspicious contents in the constant effort to stay ahead of attackers. In each of these cases, Material signals that there may be a compromise to investigate and applies an added layer of authentication, both accelerating incident response and slowing down attackers – the best of both worlds.


Want to see Material for yourself? Schedule a demo.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

Josh Donelson
5
m read
Read post
Podcast

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Listen to episode
Video

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m watch
Watch video
Downloads

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Watch video
Webinar

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Listen episode
blog post

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Material Team
10
m read
Read post
Podcast

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Listen to episode
Video

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m watch
Watch video
Downloads

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Watch video
Webinar

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Listen episode
blog post

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Material Team
35
m read
Read post
Podcast

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Listen to episode
Video

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m watch
Watch video
Downloads

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Watch video
Webinar

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Listen episode
blog post

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

Rajan Kapoor
7
m read
Read post
Podcast

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m listen
Listen to episode
Video

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m watch
Watch video
Downloads

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m listen
Watch video
Webinar

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.