Otsuka Shokai, a prominent Japanese company, has reported a significant security breach impacting some users of its Microsoft 365 service. The breach occurred when malicious third-party actors gained unauthorized access to accounts with administrator privileges. This unauthorized access presents potential risks, including the deletion or exfiltration of sensitive data, as well as the deletion of configured accounts within Microsoft 365 tenant environments. Furthermore, compromised accounts could be exploited to send spam emails, potentially harming business partners and disrupting operations.
At present, the exact method of compromise remains unclear. However, Otsuka Shokai is actively investigating the incident to better understand how the attackers gained access. In the meantime, the company has taken steps to mitigate the impact by advising affected users to immediately enable multi-factor authentication (MFA) for administrator accounts. MFA is widely regarded as a critical security measure to protect against unauthorized access and is recommended for all users to strengthen overall account security.
Otsuka Shokai has also recommended that its users adopt strong password policies to reduce the risk of future breaches. The company emphasizes the importance of securing accounts with more than just basic credentials, urging businesses to implement complex password requirements and additional layers of verification to prevent further unauthorized access.
The breach underscores the growing importance of robust cybersecurity practices, particularly for organizations relying on cloud-based services like Microsoft 365. With the increasing frequency of cyberattacks targeting enterprise systems, businesses must remain vigilant and proactive in securing their IT infrastructure. By following Otsuka Shokai’s recommendations for MFA and strong passwords, companies can better protect themselves from similar attacks and reduce the risk of future compromises.