Microsoft cautions about rising risks: Cyber actors exploiting OAuth apps for unauthorized access & malicious activities. Stay vigilant! (IT World Canada)


December 19, 2023

Microsoft has highlighted a concerning trend where malicious actors are exploiting OAuth-based applications as an automated means of authentication, leading to potential security breaches. According to a recent blog post by the tech giant, threat actors are manipulating user accounts to manipulate OAuth applications, granting them significant privileges that can be abused to conceal malicious activities.

By compromising user accounts through tactics like phishing or password spraying, attackers gain access to accounts lacking robust authentication measures. Once inside, they target accounts with permissions to create or modify OAuth applications. Exploiting these applications with elevated permissions allows threat actors to engage in various nefarious activities, including deploying virtual machines for cryptocurrency mining, establishing persistence post-business email compromise, and initiating spamming operations using the victimized organization's resources and domain name.

To combat this growing threat, IT managers are advised to adopt several security measures. These include reinforcing account credentials by implementing multifactor authentication, thereby significantly reducing the vulnerability to attacks, as suggested by Microsoft. Additionally, enabling conditional risk-based access policies can thwart attacks utilizing stolen credentials. Continuous access evaluation, where available, should also be enabled in the environment. IT managers are further urged to activate all security defaults within identity platforms and conduct thorough audits of apps and consented permissions to ensure they only access necessary data and adhere to the principle of least privilege access.

In a detailed report, Microsoft outlined the actions of a specific threat actor, identified as Storm-1283 under their new naming classification. This group utilized a compromised user account to create an OAuth application, subsequently using it to deploy virtual machines for cryptocurrency mining. Leveraging the compromised account, the attacker logged in through a VPN, created a new single-tenant OAuth application within Microsoft Entra ID, giving it a name similar to the tenant domain name. The attacker then added a set of secrets to the application, allowing unauthorized access and exploitation of the system.

Microsoft's findings underscore the critical need for heightened security measures and vigilance against OAuth abuse to prevent such unauthorized access and potential security breaches.

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

You may also like

Bitcoin Investor Buys an Entire SpaceX Flight for the Ultimate Polar Adventure

A bold new chapter in space tourism unfolded as Chun Wang, a Bitcoin investor and entrepreneur, launched into orbit on....

Elon Musk’s xAI Acquires X in $33 Billion Stock Deal

Elon Musk’s artificial intelligence startup, xAI, has officially taken over his social media platform, X, in a deal valued at....

Trump Considers Lowering Tariffs to Seal TikTok Deal

Former U.S. President Donald Trump signalled on Wednesday that he might reduce tariffs on China to facilitate the sale of....

U.S. Robotics Firms Urge National Strategy to Compete China

American robotics companies are calling for a national U.S. robotics strategy to strengthen the industry and maintain a competitive edge....

Waymo Plans Self-Driving Taxi Service in Washington by 2026

Alphabet’s autonomous taxi service, Waymo, is expanding to Washington, D.C., with plans to launch in 2026. The announcement, made on....

Trump Aides Used Signal for Secret War Talks – What to Know

Top officials from the Trump administration reportedly used the encrypted messaging app Signal to discuss military plans, sparking concerns over....

PsiQuantum Secures $750M to Advance Quantum Computing

According to sources, Quantum computing startup PsiQuantum is securing at least $750 million in funding, pushing its valuation to $6....

Are We Ready to Mine Metals from Space? The Future of Asteroid Mining

Asteroid Mining: A Sci-Fi Dream or an Inevitable Future? For decades, space enthusiasts and scientists have imagined a future where....

Nvidia CEO Surprised By Public Quantum Computing Companies

Nvidia CEO Jensen Huang admitted he was unaware that publicly traded quantum computing firms existed when he previously commented on....

Tesla Faces Crisis: Cybertruck Recall & Musk’s Trump Ties

Tesla and its CEO Elon Musk are in hot water as controversy swirls around the company. One of Tesla’s strongest....

Humanoid Robots Could Arrive Sooner Than Expected, Says Nvidia CEO

The world may be closer to a robotics revolution than most people think. Nvidia CEO Jensen Huang believes humanoid robots....

Nvidia’s AI Vision: Jensen Huang Unveils Future at GTC 2025

Nvidia CEO Jensen Huang took center stage at the GTC 2025 conference, often dubbed “AI Woodstock,” to discuss the rapid....