Chapter 6 of 12
10 min

Microsoft 365 / Google Workspace Attacks

Learning Objectives:

    Microsoft 365 / Google Workspace Attacks

    Cloud productivity platforms—Microsoft 365 and Google Workspace—are critical infrastructure for modern businesses and prime targets for attackers. With 35% of phishing impersonating Microsoft and 71.4% of M365 users experiencing monthly account compromises, securing these platforms is essential.

    The Scale of the Problem

    2024 Statistics:

    • 35% of all phishing impersonates Microsoft
    • 71.4% of M365 users have compromised account monthly
    • 10x surge in password attacks (30 billion/month)
    • 42x increase in QR code phishing targeting M365
    • $12.5 billion lost to M365-related attacks
    • Google Workspace: 15 billion phishing emails blocked daily

    Common Attack Vectors

    Microsoft 365 phishing:

    • Fake Microsoft login pages
    • "Your account will be suspended" emails
    • SharePoint file sharing notifications
    • OneDrive file requests
    • Teams meeting invites from strangers
    • OAuth app consent phishing

    Google Workspace phishing:

    • Fake Google Drive sharing notifications
    • Gmail security alert scams
    • Calendar event spam
    • OAuth permission requests
    • Google Docs commenting attacks

    QR code phishing:

    • QR codes bypass email filters
    • Leads to credential harvesting sites
    • 42x increase targeting executives
    • Appears in emails, PDFs, calendar invites

    Protection Strategies

    Authentication security:

    • Phishing-resistant MFA (FIDO2 keys, Windows Hello)
    • Disable legacy authentication protocols
    • Conditional access policies
    • Passwordless authentication where possible

    Email security:

    • Advanced threat protection enabled
    • Safe links and safe attachments
    • Anti-phishing policies configured
    • External sender warnings
    • Impersonation protection

    Access controls:

    • Conditional access based on location, device, risk
    • Block legacy protocols (SMTP, POP, IMAP)
    • Require managed/compliant devices
    • Just-in-time admin access

    Monitoring and alerts:

    • Sign-in logs reviewed regularly
    • Unusual activity alerts
    • Impossible travel detection
    • OAuth app audit
    • Data loss prevention policies

    Key Takeaways

    • 35% of phishing targets Microsoft users
    • Phishing-resistant MFA required for all accounts
    • Conditional access limits risk-based access
    • Monitor OAuth apps for suspicious permissions
    • QR code phishing bypasses traditional filters
    • Regular audits of cloud security settings