Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Barracuda Networks sees increase in acquisitions Office 365 accounts
3 min Security

Barracuda Networks sees increase in acquisitions Office 365 accounts

Eveline MeijerMay 3, 2019 10:42 amSeptember 8, 2019
Barracuda Networks sees increase in acquisitions Office 365 accounts

Researchers at Barracuda Networks have detected a large increase in account takeovers. In March, 29 percent of organizations were victims of an attempt to take over Office 365 accounts. In one month’s time, 1.5 million malicious and spam mails were sent from the hacked accounts.

The account takeover attacks were carried out in various ways. In some cases, the hackers used login details collected from previous data breaches. Since people often use the same password for different accounts, attackers were able to re-use the stolen login credentials and access multiple accounts.

Brute force attacks were also used to take over Office 365 accounts. This was successful because people use very simple passwords, which are easy to guess. Attackers also enter via web and business applications, including SMS.

The researchers also looked at which countries were logged in to gain access to the hacked accounts. This is mainly from China, with 23%. With five percent, the Netherlands is in fourth place with Vietnam, behind Brazil (9 percent) and Russia (7 percent).

Working method

According to Barracuda, taking over the Office 365 account often starts with cyber criminals pretending to work for Microsoft. Using social engineering, they persuade e-mail recipients to visit a phishing website and log in.

Once the account has been taken over, hackers monitor the activities within the company to increase the chances of successfully conducting an attack. Scammers often put rules on the mailbox to hide or delete the emails they send from the hacked account. This was the case for 34 percent of the nearly four thousand hacked accounts in March.

Cybercriminals then use the collected data to try to take over more valuable accounts. This mainly concerns accounts of top people and financial employees. Acquired accounts are also used to steal personal, financial and confidential data. This data is used, for example, for identity theft and fraud. Furthermore, the accounts are used to carry out external attacks against partners and customers.

Protection

Barracuda advises companies to defend themselves against acquisitions of Office 365 accounts. For example, according to the researchers, it is important to implement a solution that detects and protects spear phishing attacks. In addition, it is recommended to use technology that uses artificial intelligence to recognize it when an account has been acquired and notify users accordingly.

Furthermore, the use of multi-factor authentication is recommended. This provides an extra layer of protection on top of the username and password. Technology to monitor suspicious activity – such as logging in from unusual locations – is also important, according to the researchers.

Finally, it is recommended that employees be taught about spear phishing attacks so that they recognize them and do not fall victim to them. This can be done with phishing simulations, for example.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

account takeover / Barracuda / cybersecurity / Office 365

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Pentesting tool exploited in large-scale attacks

Microsoft fixes bug causing Office 365 deactivation errors

Capita suffers cyberattack, impacting Microsoft Office 365 access

Office finally becomes Microsoft 365

Editor picks

How close is China’s EUV project to eliminating ASML’s monopoly?

'Manhattan Project' is a clear threat in its infancy

JFrog brings order back to a software supply chain under AI pressure

Generative AI and AI agents are rapidly changing the way software is ...

How Corsearch migrated from Microsoft to Google and Slack

Invest heavily in change management rather than technical implementation

GPT-5.2 launched, OpenAI’s answer to Gemini 3 Pro

A new focus on knowledge work

Techzine.tv

SAP's AI workforce strategy: upskilling 100,000 employees

SAP's AI workforce strategy: upskilling 100,000 employees

AFX is NetApp's data platform of the future with integrated AI data prep

AFX is NetApp's data platform of the future with integrated AI data prep

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

Why your SOC needs a ROC, according to Qualys

Why your SOC needs a ROC, according to Qualys

Read more on Security

Pornhub hack: 200 million user data stolen by ShinyHunters

Pornhub hack: 200 million user data stolen by ShinyHunters

Hacker group ShinyHunters has stolen data from over 200 million premium customers of porn website Pornhub. Th...

Erik van Klinken 1 day ago
Sophos CEO sees “cybersecurity poverty line”: what to do about it?
Top story

Sophos CEO sees “cybersecurity poverty line”: what to do about it?

We sit down with Sophos CEO Joe Levy during Pax8 Beyond to discuss, among other things, the progress of the S...

Sander Almekinders December 11, 2025
Why did so many security vendors abandon MITRE’s stresstest?
Top story

Why did so many security vendors abandon MITRE’s stresstest?

This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...

Erik van Klinken December 12, 2025
AI conversations of 8 million users leaked via browser extensions

AI conversations of 8 million users leaked via browser extensions

Browser extensions that promise privacy are found to be selling AI conversations from millions of users. Secu...

Erik van Klinken 1 day ago

Expert Talks

The year of the AI agents: why 2026 is about value, not technology

The year of the AI agents: why 2026 is about value, not technology

Microsoft has declared 2026 to be the year of the agent. This is not ...

ARTPEC-9 and Axis Edge Vault: a unified hardware-rooted framework for cybersecure surveillance

ARTPEC-9 and Axis Edge Vault: a unified hardware-rooted framework for cybersecure surveillance

As cyber threats grow in scale and complexity, protecting network-con...

How our team optimizes infrastructure for minimal AI video processing latency 

Over the past year, AI-generated video diffusion models have enabled ...

Redefining the Software Development Lifecycle in the Age of AI

For developers, the best coding happens when they’re in a state of ...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

GITEX ASIA 2026

April 8, 2026 Singapore

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement