Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys

New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys

Posted on January 8, 2026January 8, 2026 By CWS

The safety panorama confronted a big problem simply earlier than the yr’s finish with the emergence of ConsentFix, an ingenious OAuth-based assault that exploits authentic authentication flows to extract authorization codes from Microsoft Entra techniques.

This assault represents an evolution of the ClickFix approach, demonstrating how attackers proceed to refine their strategies to compromise cloud-based authentication techniques with out triggering conventional safety controls.

ConsentFix operates by making a malicious Microsoft Entra login URL that targets the Azure CLI utility and Azure Useful resource Supervisor, directing customers to this specifically crafted hyperlink by way of phishing ways.

When an unsuspecting person visits a compromised web site, the assault chain begins. The attacker leverages the OAuth 2.0 authorization code circulation, a typical authentication mechanism that the majority customers work together with each day when logging into cloud purposes.

The person efficiently authenticates with their credentials, and their browser redirects to what needs to be a authentic reply tackle.

As an alternative of a useful utility receiving the authentication code, the person encounters an error as a result of no service listens on that localhost tackle.

The crucial vulnerability lies in what occurs subsequent. The error web page nonetheless comprises the delicate authorization code inside the redirect URL, and the attacker merely requests the person copy and paste this info by way of drag-and-drop performance.

OAuth 2.0 authorization code circulation (Supply – Glueck Kanja)

Glueck Kanja analysts famous that this system remarkably bypasses Conditional Entry insurance policies and machine compliance necessities, making it notably harmful for organizations with in any other case strong safety frameworks.

Detection and Response Mechanisms

Safety groups should perceive how ConsentFix manifests in logs to detect this assault successfully. When this assault happens, Azure sign-in logs reveal two distinct authentication occasions from the identical session.

The primary occasion represents authentic person interplay, showing as an interactive sign-in from the sufferer’s location. The second occasion, originating from the attacker’s infrastructure, seems as a non-interactive sign-in because the attacker redeems the stolen authorization code for entry tokens.

The temporal relationship between these occasions offers essentially the most dependable detection sign. Azure authorization codes stay legitimate for about ten minutes, establishing a transparent window the place attackers should redeem tokens.

By correlating matching SessionIDs, ApplicationIDs, and UserIDs between the 2 occasions inside this timeframe, defenders can determine assault makes an attempt.

Analysts should additionally word that IP addresses sometimes differ between occasions, because the person and attacker function from separate techniques.

Superior detection methods filter out authentic automation situations like GitHub Codespaces, which full this authentication dance in mere seconds, distinguishing benign exercise from malicious token theft makes an attempt.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Authentication, Bypass, Entra, Flows, Hackers, Keys, Microsoft, OAuthBased, Steal

Post navigation

Previous Post: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories
Next Post: Microsoft Unveils a New Tool to Migrate from Slack to Microsoft Teams

Related Posts

Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’ Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’ Cyber Security News
Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files Cyber Security News
Threat Actors Testing Modified and Highly Obfuscated Version of Shai Hulud Strain Threat Actors Testing Modified and Highly Obfuscated Version of Shai Hulud Strain Cyber Security News
Top 10 Best Endpoint Security Tools Top 10 Best Endpoint Security Tools Cyber Security News
Multiple GitLab Vulnerabilities Enables 2FA Bypass and DoS Attacks Multiple GitLab Vulnerabilities Enables 2FA Bypass and DoS Attacks Cyber Security News
DragonForce Ransomware Group’s Expanding Cartel Operations DragonForce Ransomware Group’s Expanding Cartel Operations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News