HomeSample Page

Sample Page Title


Ravie LakshmananMar 03, 2026Phishing / Malware

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Authorities Targets

Microsoft on Monday warned of phishing campaigns that make use of phishing emails and OAuth URL redirection mechanisms to bypass standard phishing defenses applied in e-mail and browsers.

The exercise, the corporate mentioned, targets authorities and public-sector organizations with the top aim of redirecting victims to attacker-controlled infrastructure with out stealing their tokens. It described the phishing assaults as an identity-based menace that takes benefit of OAuth’s customary, by-design habits fairly than exploiting software program vulnerabilities or stealing credentials.

“OAuth features a reliable function that enables id suppliers to redirect customers to a selected touchdown web page underneath sure circumstances, usually in error situations or different outlined flows,” the Microsoft Defender Safety Analysis Workforce mentioned.

“Attackers can abuse this native performance by crafting URLs with widespread id suppliers, resembling Entra ID or Google Workspace, that use manipulated parameters or related malicious functions to redirect customers to attacker-controlled touchdown pages. This method allows the creation of URLs that seem benign however finally result in malicious locations.”

The place to begin of the assault is a malicious utility created by the menace actor in a tenant underneath their management. The applying is configured with a redirect URL pointing to a rogue area that hosts malware. The attackers then distribute an OAuth phishing hyperlink that instructs the recipients to authenticate to the malicious utility by utilizing an deliberately invalid scope.

The results of this redirection is that customers inadvertently obtain and infect their very own gadgets with malware. The malicious payloads are distributed within the type of ZIP archives, which, when unpacked, end in PowerShell execution, DLL side-loading, and pre-ransom or hands-on-keyboard exercise, Microsoft mentioned.

The ZIP file accommodates a Home windows shortcut (LNK) that executes a PowerShell command as quickly because it’s opened. The PowerShell payload is used to conduct host reconnaissance by working discovery instructions. The LNK file extracts from the ZIP archive an MSI installer, which then drops a decoy doc to mislead the sufferer, whereas a malicious DLL (“crashhandler.dll”) is sideloaded utilizing the reliable “steam_monitor.exe” binary.

The DLL proceeds to decrypt one other file named “crashlog.dat” and executes the ultimate payload in reminiscence, permitting it to ascertain an outbound connection to an exterior command-and-control (C2) server.

Microsoft mentioned the emails use e-signature requests, Groups recordings, social safety, monetary, and political themes as lures to trick customers into clicking the hyperlink. The emails are mentioned to have been despatched by way of mass-sending instruments and customized options developed in Python and Node.js. The hyperlinks are both immediately included within the e-mail physique or positioned inside a PDF doc.

“To extend credibility, actors handed the goal e-mail handle by way of the state parameter utilizing numerous encoding strategies, permitting it to be routinely populated on the phishing web page,” Microsoft mentioned. “The state parameter is meant to be randomly generated and used to correlate request and response values, however in these instances it was repurposed to hold encoded e-mail addresses.”

Whereas a number of the campaigns have been discovered to leverage the approach to ship malware, others ship customers to pages hosted on phishing frameworks resembling EvilProxy, which act as an adversary-in-the-middle (AitM) equipment to intercept credentials and session cookies.

Microsoft has since eliminated a number of malicious OAuth functions that had been recognized as a part of the investigation. Organizations are suggested to restrict consumer consent, periodically evaluation utility permissions, and take away unused or overprivileged apps.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles