Skip to content
Blogs

Blogs

Fake OAuth Apps Fuel MFA Phishing

Posted on September 3, 2025September 26, 2025 By Finstein.ai No Comments on Fake OAuth Apps Fuel MFA Phishing

In 2025, Proofpoint identified an ongoing phishing campaign abusing Microsoft OAuth applications to compromise Microsoft 365 accounts. Threat actors created malicious OAuth apps impersonating trusted services like Adobe, SharePoint, and DocuSign, using them as lures to redirect victims to attacker-in-the-middle (AiTM) phishing sites. These sites, powered by the Tycoon Phishing-as-a-Service platform, captured credentials and session cookies to bypass MFA.

Attackers sent emails, often from compromised accounts with RFQ-themed lures or document-sharing links. When users clicked links, they were prompted to authorize OAuth apps with seemingly benign scopes (e.g., profile, email). Regardless of whether the user accepted or declined, they were redirected to counterfeit Microsoft login pages that mirrored their organization’s Entra ID branding.

Proofpoint documented over 50 such apps and multiple phishing kits. Though hundreds of users interacted with the lures, confirmed account takeovers were limited to a few dozen cases. However, Tycoon’s success rate exceeds 50% in broader Microsoft 365 targeting campaigns. Notably, Axios user agents (e.g., axios/1.7.9, axios/1.8.2) were linked to the kit’s infrastructure.

Microsoft’s enforcement of admin consent policies and legacy auth restrictions (effective August 2025) will mitigate future risk. Still, organizations should combine email, cloud, and web security with MFA-resistant authentication like FIDO2 keys.

Contact us : Finstein Cyber — Cybersecurity & VAPT Services

Source: https://www.proofpoint.com/us/blog/threat-insight/microsoft-oauth-app-impersonation-campaign-leads-mfa-phishing

#OAuthSecurity #Microsoft365 #PhishingAlert #AiTMPhishing #TycoonPhaaS #MFABypass #CloudSecurity #ThreatIntel #CyberSecurity #IdentityProtection #ProofpointResearch #MicrosoftEntra #OAuthAbuse #AccountTakeover #CyberThreats #EmailSecurity #WebSecurity #FIDO2 #MFAResistance #ThreatDetection #InfoSec

Cyber

Post navigation

Previous Post: St. Paul Deploys National Guard Amid Attack
Next Post: State Actor Spies on Asian Telecoms

Related Posts

The Blurred Line Between Corporate Management and Malware Cyber
Is Your Proprietary Code the New Ransomware Target Is Your Proprietary Code the New Ransomware Target? Ai
Your Firewall Will Fail. Is Your Recovery Ready? Your Firewall Will Fail. Is Your Recovery Ready? Cyber
Your Firewalls are Perfect, Your Employees are Not. Your Firewalls are Perfect, Your Employees are Not. Cyber
The Login That Lies The Login That Lies Ai
Why Being a “Good Employee” Makes You Easier to Phish. Why Being a “Good Employee” Makes You Easier to Phish. Cyber

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Ai
  • Cyber
  • Data Sciences
  • ERPNext
  • Technology

Copyright © 2026 Blogs.

Powered by PressBook Masonry Blogs