• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
office 365's encryption feature can be easily hacked, warns withsecure

Office 365’s encryption feature can be easily hacked, warns WithSecure

You are here: Home / General Cyber Security News / Office 365’s encryption feature can be easily hacked, warns WithSecure
October 19, 2022

Researchers at cyber security business WithSecure have issued an advisory, warning that the process used to make encrypted messages in Microsoft Place of work 365 can be cracked rather conveniently.

Microsoft Office 365 Information Encryption (OME), a characteristic offered in just the Workplace 365 suite, makes it possible for business users to mail encrypted messages as an HTML attachment through email.

Microsoft claims the perform is valuable for sending delicate facts these types of as clinical records, but WithSecure contends the company utilizes an insecure approach of operation for encryption, making it possible for menace actors to infer the framework of encrypted messages.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


OME messages are produced applying Electronic Codebook (ECB), in which the textual content of the information is damaged down into cipher blocks that are independently encrypted working with a vital saved and managed by Microsoft, as a result of Azure Rights Administration (Azure RMS). Every character inside of the plaintext is instantly substituted for a cipher text character, in accordance to the critical.

However, by this method identical blocks of plaintext will return identical blocks of encrypted textual content, making it possible for styles within just the content to be determined. This is notably the scenario with e-mails, which have structures that are far more simply predicted than other sorts of messages typically sent by means of close-to-finish encrypted (E2EE) apps, such as Sign or WhatsApp.

E-mails within organisations, which are probable to contain repeating headers or footers, could be specifically vulnerable to this type of malicious decryption, as patterns expose the encrypted substitutions for plaintext. If a message from an organisation normally signed off in the identical way, an attacker with accessibility to a databases of such messages would be ready to partially decrypt each and every a person.

WithSecure has advised organisations to take into account choice channels of communication for sensitive enterprise details.

Recipients are essential to obtain messages by means of a a person-time passcode, valid Microsoft account, or get the job done account in order to decrypt messages, and conclusion-consumers can revoke access to sent emails at any time.

Even so, OME imposes no usage restrictions on the attachment itself. It truly is possible, thus, that menace actors could intercept the attachments, print them, or be forwarded them by the primary recipient with minimal remediation doable on the sender’s conclusion.

WithSecure reported the issue, which it classifies as a vulnerability, to Microsoft on 11 January. However, immediately after quite a few recurring attempts to get hold of the tech huge, and a see that it would go public with the disclosure, WithSecure promises it gained the adhering to message from Microsoft on 21 September:

“The report was not regarded assembly the bar for security servicing, nor is it viewed as a breach. No code change was made and so no CVE was issued for this report.”

Scientists cite Microsoft compliance documentation to posit that ECB is applied to retain backwards compatibility with legacy versions of Business office, which only guidance Advanced Encryption Regular (AES) 128-little bit ECB.

In addition to OME, business buyers can use two other encryption companies within Business office 365. These are Details Legal rights Management (IRM), and S/MIME,  which each give greater manage more than the entry legal rights of despatched messages. Messages despatched through these alternatives are also encrypted utilizing distinct solutions of operation, but come with their very own accessibility positive aspects and drawbacks.

IT Pro has approached Microsoft for comment.


Some pieces of this report are sourced from:
www.itpro.co.uk

Previous Post: «how to trust your inbox with cloudflare area 1 How to trust your inbox with Cloudflare Area 1
Next Post: Medibank begins negotiations with hackers who claim to have stolen data in last week’s cyber attack medibank begins negotiations with hackers who claim to have stolen»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.