Subscribe

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Service

Protect Your Microsoft 365 Account from OAuth-Based Attacks

Protect Your Microsoft 365 Account from OAuth-Based Attacks Protect Your Microsoft 365 Account from OAuth-Based Attacks
IMAGE TITLE: LICENDI

Cybersecurity researchers have uncovered two highly sophisticated phishing campaigns exploiting OAuth redirection vulnerabilities to target Microsoft 365 users. These attacks, leveraging brand impersonation tactics, pose a serious risk of account takeovers (ATO) by bypassing traditional security controls.

How Attackers Exploit OAuth Redirection for Account Takeover

The malicious campaigns use well-known brands like Adobe and DocuSign to trick victims into granting permissions to fraudulent OAuth applications. According to Proofpoint’s Threat Insight team, researchers identified three undisclosed malicious OAuth apps disguised as Adobe Drive, Adobe Acrobat, and DocuSign. These fake applications redirect unsuspecting users to credential harvesting and malware delivery sites, making them particularly dangerous.

Microsoft 365 Tenant Exploitation & Phishing Tactics

Proofpoint warns that attackers have manipulated Microsoft 365 tenant settings and leveraged tenant architectures to embed phishing content directly into corporate environments. Unlike traditional phishing, which relies on spoofed domains or email impersonation, this method operates entirely within Microsoft’s ecosystem.

How the Attack Works

This phishing attack exploits OAuth 2.0 authorization flows. When users click a seemingly legitimate Microsoft URL, they are unknowingly redirected to an attacker-controlled site due to vulnerabilities in the OAuth implementation. The redirection is triggered by modifying authorization flow parameters, such as response_type and scope.

Because the phishing emails originate from Microsoft’s legitimate servers, they can bypass security measures like domain reputation assessments, DMARC enforcement, and anti-spoofing filters, making them harder to detect and increasing the likelihood of successful account compromise.

Minimizing Detection & Maximizing Impact

To remain undetected, attackers request minimal permissions with limited scopes like profile, email, and OpenID. Despite these low-level permission requests, Proofpoint’s threat detection engine flagged the applications as malicious, offering protection through its Account Takeover Protection service.

How Organizations Can Protect Themselves

Security experts recommend implementing phishing-resistant authentication, disabling legacy authentication protocols, enabling number matching for MFA, reviewing Azure AD sign-in logs, monitoring OAuth consent requests, and conducting regular security training to mitigate the risk of OAuth-based phishing attacks.

Who Are the Targets?

These phishing campaigns primarily target high-value employees such as executives, account managers, and finance personnel. If successful, attackers gain persistent and independent access to emails, files, contacts, and Microsoft Teams chats.

Security researchers emphasize that this attack is part of a growing trend where cybercriminals exploit built-in trust mechanisms within cloud services. By operating within Microsoft’s email system, phishing messages appear entirely genuine, making them harder to detect.

Indicators of Compromise (IOCs)

Malicious OAuth App IDs:

  • Adobe Drive: 14b2864e-3cff-4d33-b5cd-7f14ca272ea4
  • Adobe Drive X: 85da47ec-2977-40ab-af03-f3d45aaab169
  • Adobe Acrobat: 355d1228-1537-4e90-80a6-dae111bb4d70
  • DocuSign: 6628b5b8-55af-42b4-9797-5cd5c148313c

Malicious Reply & Redirection URLs:

workers.dev, tigris.dev, pages.dev

As cyber threats targeting Microsoft 365 users become more sophisticated, organizations must adopt proactive security measures. Implementing phishing-resistant authentication, monitoring suspicious OAuth consent requests, and conducting regular employee training can significantly reduce the risk of account takeovers.

By staying ahead of evolving threats, businesses can safeguard their digital assets and maintain a secure cloud environment.

For more security news, click here.

Share with others