Sourcepass MCOE Blog

What Happens After a Microsoft 365 Compromise | Sourcepass MCOE

Written by Nicole Walker | Apr 16, 2026 1:00:00 PM

Most Microsoft 365 compromises follow a familiar pattern. Initial access occurs through phishing or token abuse. Persistence mechanisms are added quietly. What follows is often a period of observation before any financial action takes place. 

Where many attack responses break down is not in detection. It is the assumption that the incident ends after a password reset. 

Identity-based attacks rarely hinge on a single credential. Once access exists, the focus shift to maintaining it. That is why activity can continue days or even weeks after remediation appears complete. 

After access is obtained, attention moves to persistence, evasion, and timing. Fully removing access usually requires more than a password reset, and preventing a repeat incident depends on addressing identity gaps inside Microsoft 365. 

 

Why Password Resets Fail to Stop Microsoft 365 Attacks 

 

Modern Microsoft 365 intrusions primarily target identity rather than endpoints. The motivation is typically financial, and the approach is persistence driven. 

Attackers often avoid malware altogether. Instead, they rely on identity-based techniques that remain effective even after password changes and basic MFA cleanup. 

Common techniques include: 

  • Session token theft through adversary-in-the-middle phishing
  • OAuth consent abuse that grants delegated mailbox or file access
  • MFA fatigue attacks that trigger accidental approval

These methods allow continued access without repeated authentication prompts or traditional endpoint alerts. 

 

What Attackers Do After a Microsoft 365 Compromise

 

Once access is established, the objective is no longer entry. It becomes persistence and timing. 

 

Establishing Persistence in Microsoft 365

Persistence ensures access remains even if the original credential is revoked. 

Common methods include: 

  • Inbox rules that forward, hide, or delete messages
  • External auto-forwarding to infrastructure outside the tenant
  • Additional authentication methods added post-compromise
  • OAuth applications that retain delegated access after initial consent
  • Entra joining attacker-controlled devices to maintain trusted access 

OAuth app abuse is frequently cited as a reliable persistence mechanism because delegated access can survive password resets and MFA changes. 

 

Reconnaissance Inside the Mailbox

After persistence is established, attackers tend to reduce noise. 

They monitor: 

  • Payment approvals

  • Vendor email threads
  • Payroll communications
  • Executive correspondence timing

This phase often lasts days or weeks. Action is typically delayed until the timing appears safe. 

 

Financial Exploitation

When attackers act, the window is often brief. 

Common outcomes include: 

  • Invoice tampering or wire redirection

  • Payroll account diversion
  • Time-delayed fraudulent requests using legitimate email threads
  • Targeting other users in the tenant who may hold higher value

The FBI continues to report Business Email Compromise as one of the highest-loss cybercrime categories year over year. 

 

Immediate Areas Addressed After a Microsoft 365 Compromise

 

After a compromise is identified, response discussions usually center on containing identity access rather than restoring a single user account. 

  1. Active Sessions and Identity Risk
    Initial focus often shifts to cutting off live access. This includes invalidating active sessions and reviewing authentication risk signals to determine whether access is still being granted under risky conditions. Static MFA alone is frequently insufficient in these situations. 

  2. Persistent Mechanisms
    Persistence is a common reason incidents resurface after initial cleanup. Early investigation typically looks for mailbox rules, forwarding configurations, added authentication methods, newly added devices, or OAuth applications that may continue to provide access beyond the original credential. 

  3. Broader Tenant Exposure
    Following an initial compromise, attention often expands beyond the affected account. Indicators such as repeated MFA prompts, similar inbox rules across users, or recent enterprise application changes are commonly examined to determine whether access extends further into the tenant. 

  4. Financial Workflows
    If the compromised identity is associated with billing, payroll, or vendor communications, those workflows become an immediate area of concern. Activity tied to financial processes is often treated as high sensitivity while legitimacy is verified through secondary channels, particularly where email trust may have been abused. 

    Accounting process controls, such as ACH change verification, remain a critical component of cybersecurity defenses against Business Email Compromise.   

Reducing the Risk of Repeat Microsoft 365 Compromise

 

Recurring compromise is most often linked to weaknesses at the identity layer rather than a single failed control. 

In post-incident discussions, attention frequently turns to how access was regained and which identity mechanisms remain exposed. 

 

MFA Quality and Approval Patterns

Push-based and SMS MFA methods are commonly discussed in the context of fatigue attacks and accidental approvals. Phishing-resistant approaches and number matching are often referenced as reducing unintended access by requiring more deliberate user interaction. 

 

Conditional Access Risk Signals 

Risk-based policies are frequently mentioned as a way to separate routine sign-ins from anomalous behavior. User risk and sign-in risk serve different purposes, and clear separation is often associated with improving visibility into suspicious authentication events. 

 

OAuth Consent and Delegated Access 

OAuth consent abuse is regularly cited as a source of persistent access that survives credential resets. Discussions in this area often focus on how broad or unmanaged consent can introduce access paths that are difficult to surface through traditional alerts. 

 

External Auto-Forwarding Behavior

Outbound forwarding is frequently mentioned as a persistence mechanism in email-based attacks. Limiting or removing forwarding reduces opportunities for silent monitoring outside the tenant once access has been established. 

 

Email Threat Signals in Defender for Office 365 

Defender for Office 365 is often referenced during incident analysis as a source of additional email-related signals. These include impersonation attempts and suspicious link or attachment activity that can help provide context around both initial access and follow-on behavior.

 

 

How to Tell When a Microsoft 365 Incident is Actually Contained

 

Containment is generally associated with clear signs that access is no longer present:

  • No active sessions remain
  • No unauthorized inbox rules or forwarding exist
  • No unknown OAuth apps retain delegated permissions
  • No repeated MFA prompts appear in sign‑in logs

Ongoing monitoring, rather than one‑time remediation, is typically what determines whether access has been fully removed. 

What Enables Ongoing Access After a Microsoft 365 Compromise

 

Microsoft 365 compromise is rarely fully contained at the moment it is detected.

Once access exists, attackers focus on persistence mechanisms that are easy to miss and difficult to invalidate through basic remediation. This is why repeated access, delayed fraud, and lingering uncertainty remain common even after initial cleanup appears complete. 

Understanding how persistence is established, where visibility gaps exist, and why identity-based attacks continue to succeed helps explain how these incidents unfold. 

Post-incident clarity is less about a single control and more about recognizing the patterns that allow access to persist, remain hidden, and resurface over time.