Microsoft Power Automate, previously known as Microsoft Flow is a software tool that allows users to create automated workflows between various apps and services.
Microsoft designed the software to help users automate mundane, manual processes in both Microsoft Office 365 and Microsoft Azure, with the final goal being boosting productivity.
Power Automate is enabled by default in all Office 365 applications and comes with about 150 standard connectors. The tool offers an equal number of premium connectors available for purchase to increase automation capabilities.
Power Automate is essentially a version of PowerShell—a scripting/development language where the network users write their own instructions to automate the task. If you have access to the environment, you most likely have access to Power Automate so it is extremely powerful for hackers. It is difficult to detect suspicious script creation because users with admin level access create similar scripts. For example, a hacker could enter the network and create a script to forward all emails from the CFO to a specific email address. It is tough to detect if that specific script is malicious unless security teams go through and read every script.
These types of sophisticated attacks are similar to ones we have seen within the Office 365 network, where hackers use legitimate tools to attack a company.
Power Automate’s workflow engine allows users to build custom integrations and automated processes across Office 365 and third-party applications without the help of developers. As useful as the software is, it comes with many potential security vulnerabilities as automation flows can bypass security policies including data loss prevention (DLP).
Power Automate’s wide availability and ease-of-use also makes it a partially useful tool for attackers to orchestrate malicious command-and-control and lateral movement behaviors.
Although Power Automate is user friendly, it is a concern for security teams. This is because:
The importance of keeping a watchful eye on the misuse of user access cannot be overstated given its prevalence in real-world attacks. In the current cybersecurity landscape, security measures like multi-factor authentication are no longer enough to deter attackers. SaaS platforms like Office 365 are a safe haven for attacker lateral movement, making it paramount to focus on user access to accounts and services. When security teams have solid information and expectations about SaaS platforms such as Office 365, malicious behaviors and privilege abuse are much easier to quickly identify and mitigate.
Deployed in minutes without agents, Vectra Cognito Detect for Office 365 gives you visibility of your Office 365 attack surface and allows you to:
Discover how cybercriminals use legitimate Office 365 services to launch attacks.
Stop attacks in Office 365 and all your SaaS applications federated with Azure AD.
550 S. Winchester Blvd., Suite 200
San Jose, CA, USA 95128
© 2020 Vectra AI, Inc. All rights reserved.