Microsoft cautions about rising risks: Cyber actors exploiting OAuth apps for unauthorized access & malicious activities. Stay vigilant! (IT World Canada)


December 19, 2023

Microsoft has highlighted a concerning trend where malicious actors are exploiting OAuth-based applications as an automated means of authentication, leading to potential security breaches. According to a recent blog post by the tech giant, threat actors are manipulating user accounts to manipulate OAuth applications, granting them significant privileges that can be abused to conceal malicious activities.

By compromising user accounts through tactics like phishing or password spraying, attackers gain access to accounts lacking robust authentication measures. Once inside, they target accounts with permissions to create or modify OAuth applications. Exploiting these applications with elevated permissions allows threat actors to engage in various nefarious activities, including deploying virtual machines for cryptocurrency mining, establishing persistence post-business email compromise, and initiating spamming operations using the victimized organization's resources and domain name.

To combat this growing threat, IT managers are advised to adopt several security measures. These include reinforcing account credentials by implementing multifactor authentication, thereby significantly reducing the vulnerability to attacks, as suggested by Microsoft. Additionally, enabling conditional risk-based access policies can thwart attacks utilizing stolen credentials. Continuous access evaluation, where available, should also be enabled in the environment. IT managers are further urged to activate all security defaults within identity platforms and conduct thorough audits of apps and consented permissions to ensure they only access necessary data and adhere to the principle of least privilege access.

In a detailed report, Microsoft outlined the actions of a specific threat actor, identified as Storm-1283 under their new naming classification. This group utilized a compromised user account to create an OAuth application, subsequently using it to deploy virtual machines for cryptocurrency mining. Leveraging the compromised account, the attacker logged in through a VPN, created a new single-tenant OAuth application within Microsoft Entra ID, giving it a name similar to the tenant domain name. The attacker then added a set of secrets to the application, allowing unauthorized access and exploitation of the system.

Microsoft's findings underscore the critical need for heightened security measures and vigilance against OAuth abuse to prevent such unauthorized access and potential security breaches.

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

You may also like

Intel to build custom chip for Amazon; shares rise sharply

Intel’s foundry division has landed a significant deal with Amazon's cloud services unit, AWS, to produce custom artificial intelligence chips.....

OpenAI’s o1 introduces new model that thinks like humans

OpenAI has unveiled its latest model, o1, also known as the "strawberry project," which is designed to enhance complex reasoning....

Teen creates a robot to solve the Rubik's Cube

A 13-year-old student from St Malachy’s College in North Belfast has built a Lego robot capable of solving a Rubik’s....

SpaceX Unveils New, Stylish EVA Spacesuits, Making History

At an altitude of 700 kilometres above Earth, Thursday’s groundbreaking SpaceX spacewalk reached a new height in space exploration. This....

Adobe to Release New AI Tool for Video Creation This Year

Adobe is set to launch a new video creation and editing tool powered by generative AI, expected to be available....

Apple's latest AirPods double as hearing aids

In a groundbreaking announcement at its recent product showcase, Apple revealed that its latest AirPods Pro will now serve a....

Huawei is about to release its competitor to Apple’s iPhone 16

Huawei’s latest smartphone has sparked considerable excitement, with over three million pre-orders pouring in even before its official release. The....

Apple's new iPhone to use Arm's next-gen chip for AI features

Apple is set to launch its highly anticipated iPhone 16 today, showcasing a new generation of technology powered by the....

Boeing’s Starliner Returns Empty, Astronauts Stay in Space

After months of uncertainty and setbacks, Boeing's new astronaut capsule, Starliner, departed the International Space Station on Friday without its....

Google Unveils 5 New Android Features: TalkBack, Music Search, and More

Google has recently rolled out a set of exciting updates for Android users, enhancing several key features and introducing new....

Recon Instruments co-founder aims to boost self-driving tech with Matt3r

Hamid Abdollahi, who co-founded Recon Instruments and made a name in the wearable tech industry, is now focusing on a....

Apple Event 2024: Products Likely Missing from September 9 Launch

Apple is gearing up for one of its most anticipated events of the year, set to take place next week.....