Go back

When a Mailbox Breach Hits Home

Like many others, I spend most of my work time at home. But I recently had a very different experience of work and home merging.

Industry Insights
October 8, 2024
5m read
5m read
5m listen
5m watch
5m watch
When a Mailbox Breach Hits Home HeaderWhen a Mailbox Breach Hits Home Thumbnail
speakers
speakers
speakers
authors
Luke Retterath
participants
No items found.
share

Like many others, I spend most of my work time at home. But I recently had a very different experience of work and home merging.

Like many others, I spend most of my work time at home. But I recently had a very different experience of work and home merging.

Last week, I shut down my laptop and made the commute from my basement to the kitchen where my kids were eating dinner. I sifted through a pile of letters and opened one from our healthcare provider that was addressed “to the personal representative of” my six year old. The letter was informing us of an incident that may have exposed her personal and health information.

I consider myself relatively unflappable, but the irony and ridiculousness of the situation were surreal. The letter outlined an incident that is both frustratingly common as well as precisely the reason Material Security exists. As a marketer, I don’t think I could have written up a better use case for Material than the piece of mail sitting in front of me. Of course, my excitement was slightly buffeted by the fact that my six year old daughter’s personal and health information may already be leaked online. 

Not to worry though, her credit and bank account numbers “were not involved” but “diagnostic and treatment information” may have been…

So what happened?

According to the letter:

“On July 30, 2024, a [redacted] employee email account was compromised due to a cyberattack. The employee accepted an unsolicited multifactor authentication prompt, which enabled the cyber-attacker to access the employee’s email account. As soon as [redacted] learned that the email account was compromised on August 7, 2024, the attacker’s IP address was blocked, and immediate password changes were made so no further access could take place.”

The tactics and timeline of an attack generally grab headlines, but these kinds of forensics are much easier to ascertain in a case such as this. How well understood is the extent of the potential damage? What exactly was extricated or otherwise exposed? What happened over the course of those nine days?

“No evidence was uncovered during our investigation to suggest that the aim of the attack was to obtain patient health information from the compromised email account, but data theft could not be ruled out. As a result, the email account and its contents were presumed compromised.  Thus, all the emails and any attachments to them required a detailed, thorough review to determine if sensitive data about one or more patients was potentially impacted. “

Not particularly comforting. As is often the case when an email account is breached, the specifics of what was done during that time and the extent to which confidential, proprietary or otherwise sensitive information may have been compromised is largely unknown. This puts the organization, our healthcare provider in this case, in a position where they must assume anything in the mailbox may have been accessed. And it puts the victims, in this case a six year old that doesn’t even know what email is, in a position where they too must assume that some of their most personal information is available now and in perpetuity somewhere on the web.

Tell me if you’ve heard this before

  1. Despite standard security measures, such as strong MFA, an email account is compromised.
  2. It takes days, weeks, and sometimes even months for the compromise to be discovered.
  3. During that time, it is unclear what precisely was accessed, read or otherwise extricated.

It’s become so obvious that traditional email security controls are insufficient, specifically inbound detections meant to thwart phishing attempts and outbound DLP that relies on emails being sent out of the mailbox. In this case, there was even strong authentication in place, courtesy of my former employer Duo Security. Unfortunately, these types of incidents are often followed by more of the same approaches that proved inadequate - more training, tighter access controls, and stricter email retention policies.

What if, rather than more of the same, we took an inside-out approach to the problem and deployed a defense-in-depth approach to the problem of email security and email account takeovers more specifically? At Material, we believe that a complete email security solution has to consider not just email as a communication protocol, but to understand that the email account is inextricably linked to the broader productivity suite and therefore represents:

  1. A communication (email) and collaboration (files) platform that is used by every employee in an organization.
  2. The de facto identity for most SaaS applications.
  3. A storage system for communications and files.

All of these are reasons why the email account is such a common and valuable target. These accounts can also become vectors for further attacks via lateral movement, BEC, and more.

The pitch

I wouldn’t be doing my job if I didn’t point out that Material Security was conceived for all of the reasons outlined above. In the most basic sense, Material protects against email-based attacks, monitors and reduces risk in Google Workspace and Microsoft 365, and limits the blast radius of a compromised account.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Securing Google Workspace for the Public Sector: Protect Sensitive Data without Disrupting Operations

Material Security helps state, local, education, and federal agencies maintain robust security measures without sacrificing the agility of cloud collaboration.

Mike Tran
7
m read
Read post
Podcast

Securing Google Workspace for the Public Sector: Protect Sensitive Data without Disrupting Operations

Material Security helps state, local, education, and federal agencies maintain robust security measures without sacrificing the agility of cloud collaboration.

7
m listen
Listen to episode
Video

Securing Google Workspace for the Public Sector: Protect Sensitive Data without Disrupting Operations

Material Security helps state, local, education, and federal agencies maintain robust security measures without sacrificing the agility of cloud collaboration.

7
m watch
Watch video
Downloads

Securing Google Workspace for the Public Sector: Protect Sensitive Data without Disrupting Operations

Material Security helps state, local, education, and federal agencies maintain robust security measures without sacrificing the agility of cloud collaboration.

7
m listen
Watch video
Webinar

Securing Google Workspace for the Public Sector: Protect Sensitive Data without Disrupting Operations

Material Security helps state, local, education, and federal agencies maintain robust security measures without sacrificing the agility of cloud collaboration.

7
m listen
Listen episode
blog post

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

Rajan Kapoor
7
m read
Read post
Podcast

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m listen
Listen to episode
Video

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m watch
Watch video
Downloads

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m listen
Watch video
Webinar

The Evolution of Email Security: Piecing Together a Fragmented Landscape

It’s time the security industry moves beyond traditional email security. The way we protect ourselves going forward must evolve with email and productivity platforms themselves and the threats they face.

7
m listen
Listen episode
blog post

When a Mailbox Breach Hits Home

Like many others, I spend most of my work time at home. But I recently had a very different experience of work and home merging.

Luke Retterath
5
m read
Read post
Podcast

When a Mailbox Breach Hits Home

Like many others, I spend most of my work time at home. But I recently had a very different experience of work and home merging.

5
m listen
Listen to episode
Video

When a Mailbox Breach Hits Home

Like many others, I spend most of my work time at home. But I recently had a very different experience of work and home merging.

5
m watch
Watch video
Downloads

When a Mailbox Breach Hits Home

Like many others, I spend most of my work time at home. But I recently had a very different experience of work and home merging.

5
m listen
Watch video
Webinar

When a Mailbox Breach Hits Home

Like many others, I spend most of my work time at home. But I recently had a very different experience of work and home merging.

5
m listen
Listen episode
blog post

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

Material Team
2
m read
Read post
Podcast

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

2
m listen
Listen to episode
Video

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

2
m watch
Watch video
Downloads

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

2
m listen
Watch video
Webinar

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

2
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.