itSMFI 2017 Forum Focus - June Forum Focus ITSMFI | Page 19

credit, OneLogin responded quickly, shutting down the hackers’ access within hours and alerting its community the same day. One detail OneLogin has not shared yet is exactly how the attackers gained access to its AWS keys, so at this point, we can only speculate. We can say, however, that if this attack is like 91 percent of cybersecurity intrusions, the initial attack vector was a phishing email. For instance, a hacker could have posed as a member of phishing attacks while a company and its clients are dealing with the aftermath of a hack. A classic tactic is to send an email to customers that appears to be a message from the CEO, warning people to change their passwords because of the recent attack, but which contains a password-reset link that leads to a website controlled by the hacker. Perhaps that’s the same hacker who invaded the company’s system earlier this week, or it could be a new, unrelated actor who is just taking advantage of the situation. Unfortunately, until its DMARC authentication setup is complete, there’s no reliable way for OneLogin customers, partners or employees to be certain that email coming from the company really does originate with the company. It’s notable that DocuSign, which also suffered a devastating security breach recently, is in a similar position. It is also not protected by email authentication. the OneLogin security team and sent an email to another security team member that looked, for all intents and purposes