This particular Cerber attack began after the perpetrators confirmed the malware could bypass the Office 365 built-in security tools. Avanan claims the perpetrators tested the malware through a private Office 365 mail account.
"The core issue, though, is how easy it could be to create a variation of this attack that bypasses Microsoft again," said Friedrich.
Many users believe that because they are using cloud email services, the security has also been outsourced, whether to Microsoft, Google, or another provider. The reality is that enterprises can't just rely on built-in security tools, since the attackers test to make sure the malware can bypass those security protections. A layered defense is critical, whether that's combining multiple security tools in the cloud or beefing up endpoint protections.
Sign up for CIO Asia eNewsletters.