Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Unveils OAuth-Based Phishing Threat

Microsoft Unveils OAuth-Based Phishing Threat

Posted on March 3, 2026 By CWS

A recent cybersecurity alert from Microsoft highlights a new phishing attack exploiting OAuth’s legitimate redirect behavior, evading traditional email and browser defenses without the need for token theft.

Researchers from Microsoft Defender have observed that these phishing campaigns focus on government and public-sector entities, with attackers leveraging trusted identity provider domains to disguise harmful redirects.

Understanding the OAuth Exploit

This phishing method differs from conventional approaches by abusing OAuth’s standard error-handling flows as specified in RFC 6749. Attackers register harmful applications within actor-controlled tenants, configure redirect URIs to attacker-owned domains, and then distribute phishing links that initiate a silent OAuth authorization process.

The URLs are crafted to target the Microsoft Entra ID’s /common/oauth2/v2.0/authorize endpoint, intentionally misusing parameters to ensure they fail rather than succeed. This process allows the identity provider to silently evaluate session states and Conditional Access policies before redirecting browsers to the attacker’s domain, all without stealing access tokens.

Detailed Attack Chain

The attack unfolds in five stages, beginning with phishing emails that often mimic e-signatures, Social Security notices, and other official communications. Some emails contain OAuth redirect URLs directly, while others hide them within PDF attachments.

Once the link is clicked, it triggers the OAuth authorization flow, using the state parameter to encode the victim’s email address in various formats. Entra ID then returns an error code, indicating the need for interactive MFA, which attackers use to gather valuable intelligence without needing to steal tokens.

Subsequent stages involve redirecting victims to phishing frameworks capable of intercepting credentials and session cookies. In specific cases, victims are led to download malicious files containing executable shortcuts and loaders, which execute reconnaissance and establish unauthorized connections.

Mitigation Strategies

To counter this threat, Microsoft advises organizations to implement several defensive measures: restrict user consent to OAuth applications, audit and remove unnecessary or overprivileged app registrations, and enable Conditional Access policies and identity protection controls.

Additionally, deploying cross-domain XDR detections and monitoring OAuth redirect URIs for suspicious activity are recommended. While Microsoft has disabled the identified malicious applications, continued vigilance is necessary as similar attacks persist.

As traditional MFA and credential defenses are strengthened, attackers are increasingly exploiting trust relationships within authentication protocols, making it crucial for organizations to stay informed and proactive.

Cyber Security News Tags:Attack, Conditional Access, Cybersecurity, Defense, Entra ID, Government, identity protection, Malware, MFA, Microsoft, OAuth, Phishing, public sector, Security, XDR

Post navigation

Previous Post: LexisNexis Breach Exposes Data from AWS Servers
Next Post: Zerobot Malware Targets Tenda Routers and n8n Platforms

Related Posts

Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used Cyber Security News
Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds Cyber Security News
CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks Cyber Security News
Google’s Salesforce Instances Hacked in Ongoing Attack Google’s Salesforce Instances Hacked in Ongoing Attack Cyber Security News
OpenSSL Conference 2025 OpenSSL Conference 2025 Cyber Security News
Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News