Skip to main content

Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing

Medium
Published: Fri Aug 01 2025 (08/01/2025, 15:39:42 UTC)
Source: AlienVault OTX General

Description

Proofpoint has uncovered a sophisticated phishing campaign utilizing fake Microsoft OAuth applications to bypass multifactor authentication and steal credentials. The threat actors impersonate various enterprise apps like RingCentral, SharePoint, Adobe, and DocuSign to lure victims. The attack chain involves OAuth app creation, redirects to malicious URLs, and the use of attacker-in-the-middle phishing kits, predominantly Tycoon. This technique has been observed in email campaigns with over 50 impersonated applications, targeting multiple industries. The campaign's goal is to gain access to Microsoft 365 accounts, potentially for information gathering, lateral movement, malware installation, or further phishing attacks.

AI-Powered Analysis

AILast updated: 08/04/2025, 10:47:49 UTC

Technical Analysis

The threat described is a sophisticated phishing campaign uncovered by Proofpoint that leverages fake Microsoft OAuth applications to bypass multifactor authentication (MFA) and steal user credentials. The attackers impersonate legitimate enterprise applications such as RingCentral, SharePoint, Adobe, and DocuSign, among over 50 others, to lure victims into authorizing malicious OAuth apps. The attack chain involves creating fraudulent OAuth applications that request permissions from users, redirecting victims to malicious URLs controlled by the attackers, and employing attacker-in-the-middle (AITM) phishing kits, predominantly the Tycoon kit, to intercept authentication tokens and credentials. This technique effectively circumvents MFA protections by exploiting OAuth's delegated authorization flow, tricking users into granting access to their Microsoft 365 accounts. Once access is obtained, attackers can conduct information gathering, lateral movement within networks, deploy malware, or launch further phishing campaigns. The campaign targets multiple industries and relies heavily on email as the initial attack vector. Indicators of compromise include specific malicious URLs and domains, as well as IP addresses associated with the campaign. While no CVE or known exploits in the wild are reported, the campaign's use of OAuth app impersonation and MFA bypass techniques represents a significant evolution in phishing tactics against cloud-based identity and access management systems.

Potential Impact

For European organizations, this threat poses a considerable risk due to the widespread adoption of Microsoft 365 services across enterprises in the region. Successful compromise of Microsoft 365 accounts can lead to unauthorized access to sensitive corporate emails, documents, and collaboration tools, potentially resulting in data breaches, intellectual property theft, and disruption of business operations. The ability to bypass MFA significantly lowers the barrier for attackers, increasing the likelihood of account takeover. This can facilitate lateral movement within corporate networks, enabling attackers to escalate privileges, deploy ransomware or other malware, and conduct espionage or sabotage. Given the reliance on cloud services and remote work environments in Europe, the attack could impact organizations of all sizes and sectors, including finance, healthcare, government, and critical infrastructure. Additionally, compromised accounts can be used to send phishing emails internally, amplifying the threat and complicating detection and response efforts.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to this threat. Specific recommendations include: 1) Enforce strict OAuth app consent policies within Microsoft 365, restricting app permissions to only those explicitly approved by administrators and regularly auditing granted consents to detect unauthorized applications. 2) Deploy conditional access policies that limit OAuth app authorizations based on user risk profiles, device compliance, and network location to reduce exposure. 3) Educate users about the risks of OAuth consent phishing, emphasizing verification of app legitimacy before granting permissions, and training them to recognize suspicious email campaigns and URLs. 4) Utilize Microsoft Defender for Office 365 and other advanced email security solutions to detect and block phishing emails leveraging OAuth app impersonation. 5) Monitor sign-in logs and OAuth app activity for anomalous patterns indicative of abuse, such as unusual app creation or consent grants. 6) Implement strong identity governance practices, including regular review and revocation of stale or unnecessary OAuth app permissions. 7) Consider deploying browser isolation or endpoint detection and response (EDR) solutions to detect and prevent attacker-in-the-middle phishing kit activity. 8) Collaborate with threat intelligence providers to stay updated on emerging indicators of compromise related to this campaign and incorporate them into security monitoring tools.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.proofpoint.com/us/blog/threat-insight/microsoft-oauth-app-impersonation-campaign-leads-mfa-phishing"]
Adversary
null
Pulse Id
688cdfbe7ede50a6ec81f692
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashca41e736dd134b5cada2ad17881ea542

Ip

ValueDescriptionCopy
ip2a00:b703:fff2:35::1

Url

ValueDescriptionCopy
urlhttps://9b031a44-7158758d.yrqwvevbjcfv.es/SZgm3kXA/
urlhttps://chikeukohandco.com/csi/index.html?redirect_mongo_id=
urlhttps://chikeukohandco.com/saas/Index.html
urlhttps://n3xxk.gmlygt.ru/chai!0jwio

Domain

ValueDescriptionCopy
domaingmlygt.ru
domainyrqwvevbjcfv.es
domain9b031a44-7158758d.yrqwvevbjcfv.es
domainn3xxk.gmlygt.ru
domainpw5.haykovx.es

Threat ID: 68908c43ad5a09ad00e00aac

Added to database: 8/4/2025, 10:32:35 AM

Last enriched: 8/4/2025, 10:47:49 AM

Last updated: 8/4/2025, 10:47:49 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats