Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams

Posted on October 22, 2025October 22, 2025 By CWS

Safety flaws in Microsoft’s Azure ecosystem allow cybercriminals to create misleading functions that imitate official companies just like the “Azure Portal”.

Varonis discovered that Azure’s safeguards, designed to dam reserved names for cross-tenant apps, may very well be bypassed utilizing invisible Unicode characters.

By inserting characters just like the Combining Grapheme Joiner (U+034F) between letters similar to “Az͏u͏r͏e͏ ͏P͏o͏r͏t͏a͏l”, attackers created apps that appeared reliable on consent screens.

This trick labored with over 260 such characters, together with these in ranges like U+FE00 to U+FE0F. The ploy exploited the truth that many Microsoft apps lack verification badges, main customers to miss warnings about third-party origins.

Azure functions, basically software program entities that combine with Azure companies, depend on person consent for permissions. Delegated permissions let apps act on a person’s behalf, accessing emails, recordsdata, and extra, whereas utility permissions grant standalone entry.

When abused, these change into potent assault vectors for preliminary entry, persistence, and privilege escalation in Microsoft 365 environments.

Phishing Techniques Gas The Risk

Varonis zeroed in on preliminary entry strategies, significantly illicit consent grants and machine code phishing. Within the former, phishing emails lure victims to pretend file hyperlinks that redirect to a consent web page.

As soon as authorized, attackers snag entry tokens with no need passwords, granting them the sufferer’s useful resource privileges.

System code phishing takes it additional: Attackers generate a verification URI and code for a malicious app, tricking customers into coming into it on a legitimate-looking website. The attacker then polls for the token, hijacking the session.

These strategies thrive on deception. Consent pages for the spoofed apps displayed convincingly, particularly when paired with Azure icons.

Discussion board discussions reveal customers routinely dismissing “unverified” alerts, assuming they’re secure from Microsoft itself.

Prohibited names examined included staples like “Microsoft Groups,” “Energy BI,” and “OneDrive SyncEngine,” underscoring the scope of potential impersonations.

Varonis disclosed the problems promptly; Microsoft mounted the preliminary Unicode bypass in April 2025 and a broader set in October 2025.

No buyer motion is required, because the updates safeguard tenants mechanically. Nonetheless, specialists urge organizations to observe app consents rigorously, implement least-privilege permissions, and educate customers on phishing pink flags.

This episode reinforces the necessity for layered defenses in cloud environments. As attackers evolve, so should vigilance lest a seemingly benign app consent unlock the door to chaos.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apps, Azure, Create, Hackers, Lets, Malicious, Microsoft, Mimicking, Teams, Vulnerability

Post navigation

Previous Post: Oracle Releases October 2025 Patches
Next Post: What Makes a Great Field CXO: Lessons from the Front Lines

Related Posts

Threat Actors Leveraging Dynamic DNS Providers to Use for Malicious Purposes Cyber Security News
New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities Cyber Security News
New ModStealer Evade Antivirus Detection to Attack macOS Users and Steal Sensitive Data Cyber Security News
2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability Cyber Security News
U.S. Government Seizes Online Marketplaces Used to Sell Fraudulent Identity Documents to Cybercriminals Cyber Security News
Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerabilities Patched in TP-Link’s Omada Gateways
  • Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition
  • Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch
  • Keycard Emerges From Stealth Mode With $38 Million in Funding
  • Russian APT Switches to New Backdoor After Malware Exposed by Researchers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerabilities Patched in TP-Link’s Omada Gateways
  • Multiple Gitlab Security Vulnerabilities Let Attackers Trigger DoS Condition
  • Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch
  • Keycard Emerges From Stealth Mode With $38 Million in Funding
  • Russian APT Switches to New Backdoor After Malware Exposed by Researchers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News