Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Alerts on OAuth Redirect Exploitation in Phishing Attacks

Microsoft Alerts on OAuth Redirect Exploitation in Phishing Attacks

Posted on March 3, 2026 By CWS

Microsoft has raised an alert regarding a sophisticated phishing scheme that capitalizes on OAuth URL redirection to evade typical email and browser defenses. This warning, issued on Monday, highlights a targeted attack on governmental and public-sector entities designed to reroute victims to attacker-operated sites without compromising their authentication tokens. The core of this threat lies in exploiting OAuth’s native features, not software weaknesses or credential theft.

Exploiting OAuth Redirection

The phishing strategy manipulates OAuth’s legitimate redirection capabilities to deceive users. Attackers craft URLs associated with well-known identity providers such as Entra ID or Google Workspace. These URLs, though appearing harmless, ultimately guide users to malicious pages under the attackers’ control. This method involves creating a deceptive application within a compromised tenant, with the redirect URL leading to a malware-hosting rogue domain.

Once the phishing link is distributed, recipients are tricked into authenticating with the malicious app via an invalid scope. This results in their devices unknowingly downloading malware, often packaged in ZIP files. When unpacked, these files initiate PowerShell commands, DLL sideloading, and potentially pre-ransomware activities.

Technical Breakdown of the Attack

The ZIP archive includes a Windows shortcut (LNK) file that triggers a PowerShell command upon opening. The command conducts host reconnaissance, while the LNK file extracts an MSI installer, which deploys a decoy document and sideloads a harmful DLL, specifically ‘crashhandler.dll,’ using the legitimate ‘steam_monitor.exe’ binary. This DLL then decrypts and executes ‘crashlog.dat,’ establishing a connection to an external command-and-control server.

Phishing emails are crafted with themes like e-signature requests, Teams recordings, and financial or political issues to lure users. These emails, disseminated via mass-emailing tools or custom Python and Node.js solutions, embed links either in the email itself or within attached PDFs. To enhance credibility, attackers encode the target’s email address within the state parameter, populating it automatically on the phishing site.

Preventive Measures and Mitigation

Microsoft’s investigation has led to the removal of several malicious OAuth applications. To mitigate such risks, organizations are urged to restrict user consents, regularly audit application permissions, and eliminate unnecessary or excessively privileged apps. While some attacks deliver malware, others redirect users to phishing frameworks like EvilProxy, which intercept credentials and session cookies through adversary-in-the-middle tactics.

The ongoing challenge of protecting against such sophisticated phishing attacks underscores the importance of robust cybersecurity measures, particularly in sectors handling sensitive information. As threat actors continue to evolve their techniques, constant vigilance and proactive defense strategies are crucial for safeguarding organizational assets.

The Hacker News Tags:cyber attack, Cybersecurity, DLL Sideloading, Government, identity-based threat, malicious applications, Malware, Microsoft, OAuth, Phishing, PowerShell

Post navigation

Previous Post: CyberStrikeAI Tool Exploits Fortinet FortiGate Weaknesses
Next Post: Android Security Update Targets 129 Vulnerabilities

Related Posts

Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model The Hacker News
Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access The Hacker News
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks The Hacker News
GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials The Hacker News
Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware The Hacker News
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News