Dear Valued CSP Partner,
We are sending you this message to inform you that we experienced a few instances in which outside actors attempted to gain access to Microsoft cloud customers’ environment, or CSP customers, through our external Office365 platform.
As a customer that uses this provisioning platform, we want to inform you that you and your customers do not appear to be among those that have been impacted.
We have been partnering with Microsoft and CrowdStrike to confirm our findings. We will provide updates to you as necessary.
It is important to remain alert. Please call us if you see any sign of security intrusion. And please email questions about this cybersecurity attack to x.
We value our relationships with you, and we appreciate the trust you place in us.
The RNC, as a customer of Synnex who is reselling Office 365/Azure services, may have been attacked through a delegated administration authorization. The minimum required privileges for the CSP to provide licensing services is not full administration rights. CSPs want this access because it makes their job easier and allows them to do more for their customers (ie: this is the "added value" in "value added reseller").
The customer may choose, but Microsoft does not make it terribly clear to CSP customers that delegating tenant administration is effectively outsourcing their cloud security to the CSP, and represents significant risk. Indeed, some creative use of Intune/MEM policies can direct custom scripting right down to desktops in a similar manner as the recent Kaseya attack. Protecting administration portals is crucial.
Vitamin C deficiency is apauling.