Microsoft cautions about rising risks: Cyber actors exploiting OAuth apps for unauthorized access & malicious activities. Stay vigilant! (IT World Canada)


December 19, 2023

Microsoft has highlighted a concerning trend where malicious actors are exploiting OAuth-based applications as an automated means of authentication, leading to potential security breaches. According to a recent blog post by the tech giant, threat actors are manipulating user accounts to manipulate OAuth applications, granting them significant privileges that can be abused to conceal malicious activities.

By compromising user accounts through tactics like phishing or password spraying, attackers gain access to accounts lacking robust authentication measures. Once inside, they target accounts with permissions to create or modify OAuth applications. Exploiting these applications with elevated permissions allows threat actors to engage in various nefarious activities, including deploying virtual machines for cryptocurrency mining, establishing persistence post-business email compromise, and initiating spamming operations using the victimized organization's resources and domain name.

To combat this growing threat, IT managers are advised to adopt several security measures. These include reinforcing account credentials by implementing multifactor authentication, thereby significantly reducing the vulnerability to attacks, as suggested by Microsoft. Additionally, enabling conditional risk-based access policies can thwart attacks utilizing stolen credentials. Continuous access evaluation, where available, should also be enabled in the environment. IT managers are further urged to activate all security defaults within identity platforms and conduct thorough audits of apps and consented permissions to ensure they only access necessary data and adhere to the principle of least privilege access.

In a detailed report, Microsoft outlined the actions of a specific threat actor, identified as Storm-1283 under their new naming classification. This group utilized a compromised user account to create an OAuth application, subsequently using it to deploy virtual machines for cryptocurrency mining. Leveraging the compromised account, the attacker logged in through a VPN, created a new single-tenant OAuth application within Microsoft Entra ID, giving it a name similar to the tenant domain name. The attacker then added a set of secrets to the application, allowing unauthorized access and exploitation of the system.

Microsoft's findings underscore the critical need for heightened security measures and vigilance against OAuth abuse to prevent such unauthorized access and potential security breaches.

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

You may also like

OpenAI Prepares to Launch New 'o3 Mini' AI Model Soon

OpenAI, the company behind ChatGPT, has finalized the development of its latest reasoning-focused AI model, dubbed “o3 mini,” and plans....

Nintendo’s Switch 2 Preview Fails to Impress, Stock Takes a Hit

Nintendo recently teased its highly anticipated Switch 2, but the reveal left many disappointed, resulting in a significant drop in....

TikTok Shutdown Looms: What U.S. Users Need to Know

TikTok, a wildly popular app with over 170 million American users, faces an imminent shutdown in the United States on....

DJI Flip Combines Lightweight Design with Advanced Features

DJI has unveiled its latest innovation, the Flip drone, a compact and user-friendly device designed for both beginners and seasoned....

TikTok Ban Sparks RedNote Surge Among US Creators

As TikTok faces a looming ban in the United States, a growing number of users and creators are flocking to....

Apple Struggles Globally as AI Features Fall Short in Phones

Apple Inc. faced a challenging year in 2024 as its iPhone sales declined, losing market share to rising Chinese smartphone....

TSMC starts making 4-nanometer chips in Arizona, Raimondo confirms

Taiwan Semiconductor Manufacturing Co. (TSMC) has reached a significant milestone in the semiconductor industry by beginning production of advanced four-nanometer....

Meta Accused of Using Pirated Books for AI Training

Meta Platforms, the parent company of Facebook, stands accused by a group of authors of using pirated versions of copyrighted....

Apple Denies Using Siri Data for Ads After $95M Settlement

Apple has reaffirmed its commitment to user privacy, addressing concerns about its Siri voice assistant in the wake of a....

Tech Industry Warns US on AI Chip Export Restrictions

A leading tech industry group called on the Biden administration to reconsider a proposed rule limiting global access to advanced....

Nvidia's Latest Innovations and Partnerships at CES 2025

At the CES 2025 conference in Las Vegas, Nvidia introduced several groundbreaking technologies aimed at transforming the artificial intelligence (AI),....

Pony.ai Targets Robotaxi Service Launch in Hong Kong

Pony.ai Inc., a company based in Guangzhou, is making moves to launch its autonomous taxi services in Hong Kong, competing....