Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys

Posted on January 8, 2026January 8, 2026 By CWS

The safety panorama confronted a big problem simply earlier than the yr’s finish with the emergence of ConsentFix, an ingenious OAuth-based assault that exploits authentic authentication flows to extract authorization codes from Microsoft Entra techniques.

This assault represents an evolution of the ClickFix approach, demonstrating how attackers proceed to refine their strategies to compromise cloud-based authentication techniques with out triggering conventional safety controls.

ConsentFix operates by making a malicious Microsoft Entra login URL that targets the Azure CLI utility and Azure Useful resource Supervisor, directing customers to this specifically crafted hyperlink by way of phishing ways.

When an unsuspecting person visits a compromised web site, the assault chain begins. The attacker leverages the OAuth 2.0 authorization code circulation, a typical authentication mechanism that the majority customers work together with each day when logging into cloud purposes.

The person efficiently authenticates with their credentials, and their browser redirects to what needs to be a authentic reply tackle.

As an alternative of a useful utility receiving the authentication code, the person encounters an error as a result of no service listens on that localhost tackle.

The crucial vulnerability lies in what occurs subsequent. The error web page nonetheless comprises the delicate authorization code inside the redirect URL, and the attacker merely requests the person copy and paste this info by way of drag-and-drop performance.

OAuth 2.0 authorization code circulation (Supply – Glueck Kanja)

Glueck Kanja analysts famous that this system remarkably bypasses Conditional Entry insurance policies and machine compliance necessities, making it notably harmful for organizations with in any other case strong safety frameworks.

Detection and Response Mechanisms

Safety groups should perceive how ConsentFix manifests in logs to detect this assault successfully. When this assault happens, Azure sign-in logs reveal two distinct authentication occasions from the identical session.

The primary occasion represents authentic person interplay, showing as an interactive sign-in from the sufferer’s location. The second occasion, originating from the attacker’s infrastructure, seems as a non-interactive sign-in because the attacker redeems the stolen authorization code for entry tokens.

The temporal relationship between these occasions offers essentially the most dependable detection sign. Azure authorization codes stay legitimate for about ten minutes, establishing a transparent window the place attackers should redeem tokens.

By correlating matching SessionIDs, ApplicationIDs, and UserIDs between the 2 occasions inside this timeframe, defenders can determine assault makes an attempt.

Analysts should additionally word that IP addresses sometimes differ between occasions, because the person and attacker function from separate techniques.

Superior detection methods filter out authentic automation situations like GitHub Codespaces, which full this authentication dance in mere seconds, distinguishing benign exercise from malicious token theft makes an attempt.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Authentication, Bypass, Entra, Flows, Hackers, Keys, Microsoft, OAuthBased, Steal

Post navigation

Previous Post: RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories
Next Post: Microsoft Unveils a New Tool to Migrate from Slack to Microsoft Teams

Related Posts

Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection Cyber Security News
Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes Cyber Security News
Mozilla Warns of Phishing Attacks Targeting Add-on Developers Account Cyber Security News
GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data Cyber Security News
Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware Cyber Security News
WhatsApp, Chrome 0-Day, AI Ransomware, and Cyber Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
  • Tim Kosiba Named NSA Deputy Director
  • FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
  • Tim Kosiba Named NSA Deputy Director
  • FBI: North Korean Spear-Phishing Attacks Use Malicious QR Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark