Detecting Office 365 Data
Leakage by an Attacker

An employee gave credentials to a criminal group. The criminal group used these credentials to log into Office 365 from the same geo-location the employee was in, and used the employee’s permissions to read classified information.