It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Simulating Microsoft 365 Threats

  • Last updated on

This topic contains the following Threat Simulations:

  • Microsoft 365 Login from a Suspicious Country

  • External Forwarding Rule Creation 

Microsoft 365 Login from a Suspicious Country

This use case tests for the ability to detect when a threat actor logs in from a suspicious country. Once a threat actor logs in to an Office 365 account, they have full access to the email account.

Test Workflow
M365 SImulation 1.png
How to Test

When onboarding for Office 365 Monitoring, there are various actions that we can monitor to make sure users are abiding by your company’s protocols and standards. Making sure users are logging in from their known, authorized countries will ensure the safety and security of all within the organization.

The alarm for “GLB.AU.CAS Successful Office 365 Login from a Suspicious Country” detects successful logins from a country with a known reputation of suspicious activity based on SOC threat intelligence.

To test this rule, a user can use a VPN to log in from the Ukraine, Vietnam, Russia, etc.

Before following this procedure, install a VPN application onto your preferred devices.

  1. Start your VPN application and connect to a VPN server located in the country you want websites to think your located in.

  2. Connect to a server from a country outside the United States, for example Ukraine.

    M365 SImulation 2.png
  3. Once you choose the country, click the power button to connect to the VPN. Wait until it is connected to the current location.

    M365 SImulation 3.png

The expected result is that Barracuda XDR triggers to the SOC if you log on to your Microsoft 365 account from outside the US and the country is on our Suspicious Country list classified within our threat environment.

M365 SImulation 4.png

 

External Forwarding Rule Creation

This use case tests the ability to detect an email forwarding rule. Auto forwarding enables an attacker to secure a foothold inside an account even after they lose direct access. It is often a stepping stone to execute lateral movement within your environment. This threat vector is usually financially motivated.

Test Workflow
M365 SImulation 5.png
How to Test

An Office 365 Forwarding rule lets you forward email messages sent to a user’s mailbox to another user’s mailbox inside or outside of your organization. This activity should always be escalated, since these actions could be performed by the user themselves or an unauthorized threat actor.

  1. At the top right of the page in the Outlook Web App, select Settings.

  2. Click View All Outlook Settings.

  3. Choose the Mail tab, then Rules, and Add New Rule.

    M365 SImulation 6.png

Create a new rule to forward email from your account to another email address. Once complete, save your changes.


M365 SImulation 7.png

M365 SImulation 8.png

Simulating Other Threats

You can simulate the following threats:

You can also view Threat Simulation videos. See Threat Simulation Videos.