How to prevent sideloading attacks in Windows and Office 365

How to prevent sideloading attacks in Windows and Office 365

Attackers know how to manage and monitor our systems better than we do. They will analyze how best to gain entrance to our networks. Attackers have found yet another way to deploy malware into our networks: a process called sideloading. Sideloading is the installation of an app onto a device from a trusted source such as the Microsoft Store. Attackers can exploit the process by convincing users they are installing a trustworthy app that actually carries a malicious payload.

Sophos recently blogged about an attack that attempted to trick Sophos staff with a targeted email and then used sideloading to install a custom application hosted on the Microsoft Store (now removed). The application would have installed malware and ransomware into a network. We’ve also seen attackers use Office 365 third-party applications to gain access to a network and steal key information. So, what options do you have to block and defend yourself from sideloading attacks?

To read this article in full, please click here



Support the originator by clicking the read the rest link below.