Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
OAuth Consent: The New Phishing Threat Bypassing MFA

OAuth Consent: The New Phishing Threat Bypassing MFA

Posted on May 19, 2026 By CWS

In February 2026, a new phishing-as-a-service platform named EvilTokens emerged, posing a significant threat to Microsoft 365 users. Within a short span, this platform compromised over 340 organizations across five countries. This alarming development highlights the vulnerabilities in current security protocols.

The Mechanics Behind OAuth Consent Phishing

Victims of EvilTokens received messages prompting them to enter a code at microsoft.com/devicelogin, completing a standard multi-factor authentication (MFA) process. Unbeknownst to them, this action provided attackers with a refresh token linked to their mailbox, drive, calendar, and contacts. This token’s lifespan extended beyond a typical session, dictated by tenant policies.

The attackers bypassed traditional security measures without needing passwords or triggering MFA alerts. This success stems from the routine acceptance of OAuth consent screens, which existing security protocols fail to scrutinize thoroughly. Researchers have termed this issue ‘consent phishing’ or ‘OAuth grant abuse,’ posing a significant risk beneath the layer of identity controls.

Challenges in Detecting OAuth Grant Abuse

Unlike traditional credential phishing, where usernames and passwords are replayed, OAuth grants do not leave such trails. Users authenticate through legitimate providers, complete MFA, and unknowingly hand over refresh tokens. These tokens are legitimate, signed by identity providers, and are refreshable, evading MFA’s protective measures.

The persistence of these tokens, even after password resets, further complicates security. Tokens issued by EvilTokens remain valid for extended periods unless explicitly revoked or re-consent is demanded through conditional access policies.

Normalization of Consent and Resulting Risks

The threat landscape has evolved with OAuth’s widespread adoption. Users frequently encounter consent screens, similar to cookie banners, often clicking through without due consideration. This behavior is exploited by attackers, who take advantage of the gap between consent language and actual operational reach.

Attacks can escalate through toxic combinations of OAuth consents across multiple applications. For instance, a user might grant access to different applications individually, creating a network of permissions that span multiple services, inadvertently allowing data breaches.

Mitigating Risks and Enhancing Security

To address these vulnerabilities, organizations must treat OAuth consent with the same rigor as authentication processes. Key strategies include maintaining an inventory of OAuth applications, monitoring token age and re-consent, identifying cross-application identities, and implementing conditional access policies that trigger on consent events.

Platforms like Reco are stepping up to automate these tasks by mapping OAuth grants and AI agents into a comprehensive identity graph, ensuring continuous monitoring and proactive threat detection. This approach allows for timely revocation of access, offering a robust defense against emerging threats.

As consent phishing grows, it is imperative to bridge the gap in security by applying the same level of scrutiny to OAuth grants and AI connections as is currently applied to authentication protocols.

The Hacker News Tags:AI security, consent phishing, Cybersecurity, identity governance, identity theft, MFA, OAuth, PhaaS, Phishing, Reco, refresh token, SaaS, Security, security platform, threat detection

Post navigation

Previous Post: VoidStealer Malware Exploits Chrome Security Flaws
Next Post: Increase in Malware Attacks via MSHTA Exploitation

Related Posts

Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery The Hacker News
Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale The Hacker News
CISA Identifies Critical Flaws in ConnectWise and Windows CISA Identifies Critical Flaws in ConnectWise and Windows The Hacker News
Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts The Hacker News
Post-Quantum Cryptography and AI Vulnerabilities: A Security Update Post-Quantum Cryptography and AI Vulnerabilities: A Security Update The Hacker News
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyber Resilience: Key to Modern Business Continuity
  • DirtyDecrypt Exploit PoC for Linux Kernel Vulnerability Released
  • GitHub Action Hack Exposes Developer Credentials
  • Critical ChromaDB Flaw Enables Potential Server Takeover
  • Drupal Urges Immediate Core Security Updates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyber Resilience: Key to Modern Business Continuity
  • DirtyDecrypt Exploit PoC for Linux Kernel Vulnerability Released
  • GitHub Action Hack Exposes Developer Credentials
  • Critical ChromaDB Flaw Enables Potential Server Takeover
  • Drupal Urges Immediate Core Security Updates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark