Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys

Posted on January 8, 2026January 8, 2026 By CWS

The safety panorama confronted a big problem simply earlier than the yr’s finish with the emergence of ConsentFix, an ingenious OAuth-based assault that exploits authentic authentication flows to extract authorization codes from Microsoft Entra techniques.

This assault represents an evolution of the ClickFix approach, demonstrating how attackers proceed to refine their strategies to compromise cloud-based authentication techniques with out triggering conventional safety controls.

ConsentFix operates by making a malicious Microsoft Entra login URL that targets the Azure CLI utility and Azure Useful resource Supervisor, directing customers to this specifically crafted hyperlink by way of phishing ways.

When an unsuspecting person visits a compromised web site, the assault chain begins. The attacker leverages the OAuth 2.0 authorization code circulation, a typical authentication mechanism that the majority customers work together with each day when logging into cloud purposes.

The person efficiently authenticates with their credentials, and their browser redirects to what needs to be a authentic reply tackle.

As an alternative of a useful utility receiving the authentication code, the person encounters an error as a result of no service listens on that localhost tackle.

The crucial vulnerability lies in what occurs subsequent. The error web page nonetheless comprises the delicate authorization code inside the redirect URL, and the attacker merely requests the person copy and paste this info by way of drag-and-drop performance.

OAuth 2.0 authorization code circulation (Supply – Glueck Kanja)

Glueck Kanja analysts famous that this system remarkably bypasses Conditional Entry insurance policies and machine compliance necessities, making it notably harmful for organizations with in any other case strong safety frameworks.

Detection and Response Mechanisms

Safety groups should perceive how ConsentFix manifests in logs to detect this assault successfully. When this assault happens, Azure sign-in logs reveal two distinct authentication occasions from the identical session.

The primary occasion represents authentic person interplay, showing as an interactive sign-in from the sufferer’s location. The second occasion, originating from the attacker’s infrastructure, seems as a non-interactive sign-in because the attacker redeems the stolen authorization code for entry tokens.

The temporal relationship between these occasions offers essentially the most dependable detection sign. Azure authorization codes stay legitimate for about ten minutes, establishing a transparent window the place attackers should redeem tokens.

By correlating matching SessionIDs, ApplicationIDs, and UserIDs between the 2 occasions inside this timeframe, defenders can determine assault makes an attempt.

Analysts should additionally word that IP addresses sometimes differ between occasions, because the person and attacker function from separate techniques.

Superior detection methods filter out authentic automation situations like GitHub Codespaces, which full this authentication dance in mere seconds, distinguishing benign exercise from malicious token theft makes an attempt.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Authentication, Bypass, Entra, Flows, Hackers, Keys, Microsoft, OAuthBased, Steal

Post navigation

Previous Post: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories
Next Post: Microsoft Unveils a New Tool to Migrate from Slack to Microsoft Teams

Related Posts

Researchers Reversed Asgard Malware Protector to Uncover it’s Antivirus Bypass Techniques Cyber Security News
Microsoft Releases Mitigations and Threat Hunting Queries for SharePoint Zero-Day Cyber Security News
7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code Cyber Security News
Critical GNU Wget2 Vulnerability Let Remote Attackers to Overwrite Sensitive Files Cyber Security News
Underground Ransomware Gang With New Tactics Against Organizations Worldwide Cyber Security News
Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark