OAuth Redirect Abuse Targets Government Agencies With Malware Delivery

TL;DR Summary
Microsoft warns of phishing campaigns that exploit OAuth redirect flows to bypass email and browser defenses, steering government and public-sector victims to attacker-controlled landing pages. Attackers use a malicious OAuth app with a redirect URL to rogue domains; victims authenticate, triggering ZIP-delivered payloads that execute PowerShell, DLL sideloading, and in-memory malware to reach a remote C2 server. Some campaigns also employ EvilProxy for credential interception. Defenders are advised to limit user consent, review app permissions, and remove unused or overprivileged apps.
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets The Hacker News
- OAuth redirection abuse enables phishing and malware delivery Microsoft
- Phish of the day: Microsoft OAuth scams abuse redirects for malware delivery theregister.com
- Entra ID OAuth Consent Can Grant ChatGPT Access to Emails Hackread
- OAuth phishers make ‘check where the link points’ advice ineffective csoonline.com
Reading Insights
Total Reads
1
Unique Readers
18
Time Saved
2 min
vs 3 min read
Condensed
86%
568 → 81 words
Want the full story? Read the original article
Read on The Hacker News