Microsoft cautions about rising risks: Cyber actors exploiting OAuth apps for unauthorized access & malicious activities. Stay vigilant! (IT World Canada)


December 19, 2023

Microsoft has highlighted a concerning trend where malicious actors are exploiting OAuth-based applications as an automated means of authentication, leading to potential security breaches. According to a recent blog post by the tech giant, threat actors are manipulating user accounts to manipulate OAuth applications, granting them significant privileges that can be abused to conceal malicious activities.

By compromising user accounts through tactics like phishing or password spraying, attackers gain access to accounts lacking robust authentication measures. Once inside, they target accounts with permissions to create or modify OAuth applications. Exploiting these applications with elevated permissions allows threat actors to engage in various nefarious activities, including deploying virtual machines for cryptocurrency mining, establishing persistence post-business email compromise, and initiating spamming operations using the victimized organization's resources and domain name.

To combat this growing threat, IT managers are advised to adopt several security measures. These include reinforcing account credentials by implementing multifactor authentication, thereby significantly reducing the vulnerability to attacks, as suggested by Microsoft. Additionally, enabling conditional risk-based access policies can thwart attacks utilizing stolen credentials. Continuous access evaluation, where available, should also be enabled in the environment. IT managers are further urged to activate all security defaults within identity platforms and conduct thorough audits of apps and consented permissions to ensure they only access necessary data and adhere to the principle of least privilege access.

In a detailed report, Microsoft outlined the actions of a specific threat actor, identified as Storm-1283 under their new naming classification. This group utilized a compromised user account to create an OAuth application, subsequently using it to deploy virtual machines for cryptocurrency mining. Leveraging the compromised account, the attacker logged in through a VPN, created a new single-tenant OAuth application within Microsoft Entra ID, giving it a name similar to the tenant domain name. The attacker then added a set of secrets to the application, allowing unauthorized access and exploitation of the system.

Microsoft's findings underscore the critical need for heightened security measures and vigilance against OAuth abuse to prevent such unauthorized access and potential security breaches.

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

You may also like

Cheap Laptops Challenge MacBook Neo With More Storage and Memory

Apple has stepped into the budget laptop segment with the launch of the MacBook Neo, priced at $599. On paper,....

Apple iPhone 17e Leads Apple Product Launch Week With M4 iPad Air Update

Apple has kicked off a fresh round of hardware announcements with a clear focus on value and performance. The company....

Viral AI Caricature Trend Sparks Serious Privacy Fears, Expert Warns

A viral social media trend that turns personal details into AI-generated caricatures is raising red flags among cybersecurity experts, who....

India AI Impact Summit 2026: Global Leaders, CEOs Gather in New Delhi for High-Stakes Talks

India has opened a major global gathering focused on artificial intelligence and its growing worldwide influence. The India AI Impact....

PlayStation State of Play February 2026: Biggest Announcements and Games Revealed

One week after Nintendo set the tone for 2026, PlayStation stepped forward with its own showcase. The PlayStation State of....

Bell AI Data Centre Near Regina Signals Major Tech Investment in Saskatchewan

Bell Canada is planning a major expansion of artificial intelligence infrastructure near Regina, according to newly filed municipal documents.The project....

Moltbook: Experts Flag Security Risks on Viral AI Forum

A strange new social platform has captured the internet’s curiosity — and concern. Moltbook, a social forum designed exclusively for....

Global Software Stocks Slide as AI Fears Trigger ‘SaaSpocalypse’

A global sell-off in software stocks is accelerating as investors grow increasingly anxious about how fast artificial intelligence could upend....

Experts Find Rare Space Molecule Hints at Life Origins of Past Life

Scientists have identified the largest organic molecule containing sulfur ever found in interstellar space, a discovery that may help explain....

NASA updates Artemis II wet dress test and launch windows soon

NASA has moved the timeline for a key Artemis II test because of severe winter weather in Florida. The agency....

Meta Blocks Teens From AI Characters Ahead of Child Safety Trial

Meta is temporarily revoking teen access to its AI characters as scrutiny over tech platforms and child safety intensifies. The....

NASA Astronaut Sunita Williams Retires After 9-Month Orbital Ordeal

NASA astronaut Sunita Williams has announced her retirement, marking the end of a remarkable 27-year career in space exploration. Her....