OAuth Redirect Attacks Deliver Malware and Bypass MFA

1 min read
Source: BleepingComputer
OAuth Redirect Attacks Deliver Malware and Bypass MFA
Photo: BleepingComputer
TL;DR Summary

Microsoft Defender researchers warn attackers abuse OAuth 2.0 redirect flows to bypass phishing protections by registering malicious OAuth apps and directing users to attacker-controlled redirect URIs, sometimes via PDFs; victims are taken to phishing pages or intermediaries like EvilProxy that can intercept session cookies to bypass MFA. Other campaigns deliver ZIPs with LNK files that launch PowerShell and DLL side-loading to drop payloads. These are identity-based threats exploiting standard OAuth error handling; Microsoft advises tighter OAuth permissions, stronger identity protections, Conditional Access, and cross-domain detection across email, identity, and endpoints.

Share this article

Reading Insights

Total Reads

1

Unique Readers

1

Time Saved

3 min

vs 4 min read

Condensed

88%

72790 words

Want the full story? Read the original article

Read on BleepingComputer