Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams

Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams

Posted on October 22, 2025October 22, 2025 By CWS

Safety flaws in Microsoft’s Azure ecosystem allow cybercriminals to create misleading functions that imitate official companies just like the “Azure Portal”.

Varonis discovered that Azure’s safeguards, designed to dam reserved names for cross-tenant apps, may very well be bypassed utilizing invisible Unicode characters.

By inserting characters just like the Combining Grapheme Joiner (U+034F) between letters similar to “Az͏u͏r͏e͏ ͏P͏o͏r͏t͏a͏l”, attackers created apps that appeared reliable on consent screens.

This trick labored with over 260 such characters, together with these in ranges like U+FE00 to U+FE0F. The ploy exploited the truth that many Microsoft apps lack verification badges, main customers to miss warnings about third-party origins.

Azure functions, basically software program entities that combine with Azure companies, depend on person consent for permissions. Delegated permissions let apps act on a person’s behalf, accessing emails, recordsdata, and extra, whereas utility permissions grant standalone entry.

When abused, these change into potent assault vectors for preliminary entry, persistence, and privilege escalation in Microsoft 365 environments.

Phishing Techniques Gas The Risk

Varonis zeroed in on preliminary entry strategies, significantly illicit consent grants and machine code phishing. Within the former, phishing emails lure victims to pretend file hyperlinks that redirect to a consent web page.

As soon as authorized, attackers snag entry tokens with no need passwords, granting them the sufferer’s useful resource privileges.

System code phishing takes it additional: Attackers generate a verification URI and code for a malicious app, tricking customers into coming into it on a legitimate-looking website. The attacker then polls for the token, hijacking the session.

These strategies thrive on deception. Consent pages for the spoofed apps displayed convincingly, particularly when paired with Azure icons.

Discussion board discussions reveal customers routinely dismissing “unverified” alerts, assuming they’re secure from Microsoft itself.

Prohibited names examined included staples like “Microsoft Groups,” “Energy BI,” and “OneDrive SyncEngine,” underscoring the scope of potential impersonations.

Varonis disclosed the problems promptly; Microsoft mounted the preliminary Unicode bypass in April 2025 and a broader set in October 2025.

No buyer motion is required, because the updates safeguard tenants mechanically. Nonetheless, specialists urge organizations to observe app consents rigorously, implement least-privilege permissions, and educate customers on phishing pink flags.

This episode reinforces the necessity for layered defenses in cloud environments. As attackers evolve, so should vigilance lest a seemingly benign app consent unlock the door to chaos.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apps, Azure, Create, Hackers, Lets, Malicious, Microsoft, Mimicking, Teams, Vulnerability

Post navigation

Previous Post: Oracle Releases October 2025 Patches
Next Post: Fencing and Pet Company Jewett-Cameron Hit by Ransomware

Related Posts

Tenable Confirms Data Breach – Hackers Accessed Customers Contact Details Tenable Confirms Data Breach – Hackers Accessed Customers Contact Details Cyber Security News
New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample New Malware Spotted in The Wild Using Prompt Injection to Manipulate AI Models Processing Sample Cyber Security News
New ClickFix Attack Mimic as AnyDesk Leverages Windows Search to Drop MetaStealer New ClickFix Attack Mimic as AnyDesk Leverages Windows Search to Drop MetaStealer Cyber Security News
DIG AI – Darknet AI Tool Enabling Threat Actors to Launch Sophisticated Attacks DIG AI – Darknet AI Tool Enabling Threat Actors to Launch Sophisticated Attacks Cyber Security News
GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware Cyber Security News
Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer Threat Actors Leverage Blender Foundation Files to Deliver Notorious StealC V2 Infostealer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark