Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Uncovering Malicious OAuth Campaigns in Entra ID

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 11:04:36 UTC)
Source: AlienVault OTX General

Description

This analysis reveals the growing threat of malicious OAuth applications in Microsoft Entra ID, which attackers use for persistence and privilege escalation. The report details how these apps blend in with legitimate integrations, making detection challenging. It describes the creation of OAuth Apps Scout, an automated detection pipeline that identifies emerging malicious OAuth apps. The research uncovered multiple campaigns, including one involving 19 apps impersonating well-known brands. The report compares tactics from 2019 to 2025, showing an evolution in attacker strategies from Microsoft impersonation to third-party SaaS spoofing. It concludes with actionable defense strategies for organizations to protect against these threats.

AI-Powered Analysis

AILast updated: 02/19/2026, 13:06:42 UTC

Technical Analysis

This threat involves malicious OAuth applications targeting Microsoft Entra ID (formerly Azure Active Directory) environments. Attackers create OAuth apps that request permissions to access organizational resources, leveraging OAuth consent flows to gain persistent access and escalate privileges. These malicious apps are crafted to closely resemble legitimate integrations, including impersonation of well-known brands and SaaS providers, making them difficult to detect through conventional means. The research highlights a shift in attacker tactics from 2019 to 2025, moving from direct Microsoft impersonation to more sophisticated third-party SaaS spoofing. The OAuth Apps Scout automated detection pipeline was developed to identify emerging malicious OAuth apps by analyzing app metadata, consent patterns, and behavioral indicators. The campaigns uncovered include one with 19 malicious apps impersonating trusted brands to deceive users into granting consent. The abuse of OAuth consent mechanisms enables attackers to bypass traditional authentication controls, maintain long-term persistence, and perform privilege escalation within cloud environments. The threat leverages techniques such as consent phishing (T1566, T1204.001), token manipulation (T1550, T1550.001), and application impersonation (T1534). Detection is challenging due to the legitimate appearance of these apps and the complexity of OAuth flows. The report concludes with defense strategies including continuous monitoring of OAuth app registrations, implementing strict consent policies, and leveraging automated detection tools like OAuth Apps Scout to identify anomalous or suspicious OAuth applications.

Potential Impact

Organizations worldwide using Microsoft Entra ID and OAuth-based integrations face significant risks from these malicious OAuth apps. Successful exploitation can lead to unauthorized access to sensitive data, persistent footholds within cloud environments, and privilege escalation, potentially enabling lateral movement and data exfiltration. The blending of malicious apps with legitimate ones complicates detection, increasing dwell time and the likelihood of extensive compromise. This threat undermines identity security and cloud trust models, impacting confidentiality, integrity, and availability of organizational resources. Enterprises relying heavily on SaaS applications and cloud identity providers are particularly vulnerable, as attackers exploit user consent mechanisms to bypass traditional security controls. The medium severity reflects the threat's potential to cause moderate to severe damage, especially in environments lacking robust OAuth app governance and monitoring. The absence of known exploits in the wild suggests emerging but actively developing campaigns, warranting proactive defense measures.

Mitigation Recommendations

Organizations should implement a multi-layered defense strategy tailored to OAuth app security. First, enforce strict OAuth consent policies limiting app permissions to the minimum necessary and require admin consent for high-risk scopes. Regularly audit and inventory all registered OAuth applications within Entra ID to identify unauthorized or suspicious apps. Deploy automated detection tools such as OAuth Apps Scout or similar solutions that analyze app metadata, consent patterns, and behavioral anomalies to flag malicious apps early. Educate users about the risks of granting OAuth app permissions, emphasizing caution with consent prompts, especially those mimicking trusted brands. Integrate OAuth app monitoring with Security Information and Event Management (SIEM) systems to correlate suspicious activities. Implement conditional access policies to restrict OAuth app usage based on risk factors such as user location, device compliance, and sign-in risk. Consider leveraging Microsoft Defender for Identity and Cloud App Security features to detect anomalous OAuth app behaviors. Finally, establish incident response playbooks specifically addressing OAuth consent abuse scenarios to enable rapid containment and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.wiz.io/blog/detecting-malicious-oauth-applications"]
Adversary
null
Pulse Id
6996ee44a7b3d1015da4ed4b
Threat Score
null

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttp://officemtr.com:8081/office
urlhttp://ynapaletsteamworkspace.myclickfunnels.com/

Domain

ValueDescriptionCopy
domainanchorsgordon.com
domainaquaphalts.com
domainceyanos.info
domaincooltekinc.com
domaincooltekllc.com
domaincreiamc.com
domaincreicapital.com
domaindgm-f.org
domaindustdevilbaseball.com
domainekistruct.com
domainexperienccolumbiasc.com
domainfpwd.com
domaingreenpole-ps.com
domaini-businessplan.com
domainibusinessplan.com
domainieng-group.com
domainieng.group
domainkilllpack.com
domainkkodd.co
domainledconsultinglc.com
domainlnsrc.org
domainmediabrushmarketings.com
domainmichaelselectrics.com
domainncerc.org
domainnoknok-inc.co
domainnoknok.co
domainnoknokgroceries.com
domainofficemtr.com
domainsummitcountysco.com
domainthermion.se
domaintimes-7.com
domaintwothirtythree.co
domainwallsofttech.com
domainwgarnett.com
domainsharepoint.microzoftonline.com
domainynapaletsteamworkspace.myclickfunnels.com

Threat ID: 69970717b557332a80d4689b

Added to database: 2/19/2026, 12:50:31 PM

Last enriched: 2/19/2026, 1:06:42 PM

Last updated: 2/20/2026, 3:08:14 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats