Go back

How to Use Email Behavior as Account Compromise Signals

In a previous blog post, I made the case that the typical approach to email threat detection and response is missing a critical element – containment. Simply relying on surface-level detections that monitor incoming and outgoing traffic isn't enough to safeguard the resources and data accessible via an email account. In this post, we'll focus on a few practical examples of email behaviors that Material has a unique ability to pinpoint that may indicate an account compromise.

Engineering
February 24, 2024
5m read
5m read
5m listen
5m watch
5m watch
two circles in a green background
speakers
speakers
speakers
authors
Ivan Dwyer
participants
No items found.
share

In a previous blog post, I made the case that the typical approach to email threat detection and response is missing a critical element – containment. Simply relying on surface-level detections that monitor incoming and outgoing traffic isn't enough to safeguard the resources and data accessible via an email account. In this post, we'll focus on a few practical examples of email behaviors that Material has a unique ability to pinpoint that may indicate an account compromise.

In light of two recent incidents at Microsoft, where nation state attackers compromised email accounts, there’s a heightened interest in examining protections across your entire cloud email infrastructure. The first event, from a Chinese group dubbed Storm-0558, was a sophisticated attack that took advantage of a unique sequence of events to forge a valid access token for an Outlook email account. The more recent attack this week, from a Russian group named Midnight Blizzard, was a persistent attack that took advantage of weak authentication controls on a number of test email accounts then used as a pivot point to gain access to a number of high-profile executive email accounts. Both scenarios highlight that the sophistication of modern attacks lies in the ability to remain obscured from common detections for as long as possible.

Monitoring for account takeovers is a fickle beast given that a compromised account effectively operates as an insider. It’s difficult for systems to distinguish between normal business tasks, irregular use, and malicious activities. The inherent risk and potential consequences of elevated access and unwanted data exposure make it tempting to implement restrictive controls across all systems, however, one may find pushback from the business and an overwhelming number of low-risk alerts from normal workforce use.

Striking the right balance between security and productivity is an ongoing effort where the right set of tradeoffs isn't always obvious. The following examples are intended to highlight potential account takeover scenarios that are worthy of attention, and how Material helps address them.

Email Auto-Forwarding

Auto-forwarding is a common tactic used by attackers to discreetly monitor communications and steal sensitive information after gaining access to an email account. This is done by setting up a rule that automatically forwards emails to an external account. The insidious nature of this method lies in its ability to go unnoticed for extended periods. The forwarding rule operates silently, allowing the attacker to maintain a persistent presence in the compromised account.

Material offers advanced monitoring capabilities specifically designed to detect changes in email settings, including the creation of new auto-forwarding rules. By setting up an event subscription with Material, administrators can be instantly alerted about any modifications to forwarding rules. These alerts can be configured to be delivered via Slack, email, or webhook.

When an unauthorized forwarding rule is detected, incident response teams can quickly investigate and take appropriate action, such as revoking the rule and locking the account. This proactive approach not only stops data exfiltration in its tracks but also minimizes further lateral movement.

create subscription content image

Failed Message Retrieval Events

Multi-Factor Authentication (MFA) is a crucial security measure, but it also serves as a valuable indicator of potential account breaches. When there are multiple failed attempts to bypass MFA, it often signals that an unauthorized user is trying to gain access.

Material’s novel approach to data protection applies MFA directly to email messages containing sensitive data, such as Personally Identifiable Information (PII), Protected Health Information (PHI), and Payment Card Information (PCI). This targeted approach ensures that emails with critical data require additional verification – valid users can still access the messages they need with a simple auth flow, but attackers are significantly slowed down.

Material logs all attempts to access these protected messages, and can be configured to fire off an alert for any failed retrieval attempts. Such failed attempts are significant red flags, indicating that someone may be trying to access sensitive information without proper authorization.

access request content image


Password Reset Attempts

Email accounts are a form of identification, and attackers frequently target them to gain elevated access to downstream systems and applications. Once an attacker compromises an email account, a typical strategy is to change passwords for as many services as possible linked to that account. This tactic not only grants them broader unauthorized access but also effectively locks out the legitimate owner of the account.

In this context, password reset attempts are a signal for an account compromise. Material addresses this scenario proactively, detecting emails from service providers that indicate email confirmation. As we do with emails that contain sensitive data, we apply a layer of authentication to follow through with the request. This extra layer of security means that any attempt to reset a password via a compromised email account will require additional verification, which an attacker is less likely to bypass.

This strategy effectively adds a significant speedbump for attackers. If an unauthorized user tries to reset passwords, the MFA requirement on the confirmation email can serve as an immediate red flag. It not only prevents the attacker from easily continuing their malicious activities but also alerts the user and the security team of the suspicious activity.

Password Reset attempt caught in the Material dashboard
protection content image

Takeaways

These examples further stress the importance of an effective containment strategy around email accounts. Detecting suspicious behaviors is as important as detecting suspicious contents in the constant effort to stay ahead of attackers. In each of these cases, Material signals that there may be a compromise to investigate and applies an added layer of authentication, both accelerating incident response and slowing down attackers – the best of both worlds.


Want to see Material for yourself? Schedule a demo.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

Rajan Kapoor, VP, Security
m read
Read post
Podcast

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen to episode
Video

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m watch
Watch video
Downloads

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Watch video
Webinar

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen episode
blog post

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

Mike Moran, Ph.D.
7
m read
Read post
Podcast

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen to episode
Video

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m watch
Watch video
Downloads

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Watch video
Webinar

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen episode
blog post

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

Nate Abbott
3
m read
Read post
Podcast

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen to episode
Video

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m watch
Watch video
Downloads

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Watch video
Webinar

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen episode
blog post

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

Patrick Duffy
5
m read
Read post
Podcast

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Listen to episode
Video

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m watch
Watch video
Downloads

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Watch video
Webinar

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New