Uncovering Malicious OAuth Campaigns in Entra ID
This analysis reveals the growing threat of malicious OAuth applications in Microsoft Entra ID, which attackers use for persistence and privilege escalation. The report details how these apps blend in with legitimate integrations, making detection challenging. It describes the creation of OAuth Apps Scout, an automated detection pipeline that identifies emerging malicious OAuth apps. The research uncovered multiple campaigns, including one involving 19 apps impersonating well-known brands. The report compares tactics from 2019 to 2025, showing an evolution in attacker strategies from Microsoft impersonation to third-party SaaS spoofing. It concludes with actionable defense strategies for organizations to protect against these threats.
AI Analysis
Technical Summary
This threat involves malicious OAuth applications targeting Microsoft Entra ID (formerly Azure Active Directory) environments. Attackers create OAuth apps that request permissions to access organizational resources, leveraging OAuth consent flows to gain persistent access and escalate privileges. These malicious apps are crafted to closely resemble legitimate integrations, including impersonation of well-known brands and SaaS providers, making them difficult to detect through conventional means. The research highlights a shift in attacker tactics from 2019 to 2025, moving from direct Microsoft impersonation to more sophisticated third-party SaaS spoofing. The OAuth Apps Scout automated detection pipeline was developed to identify emerging malicious OAuth apps by analyzing app metadata, consent patterns, and behavioral indicators. The campaigns uncovered include one with 19 malicious apps impersonating trusted brands to deceive users into granting consent. The abuse of OAuth consent mechanisms enables attackers to bypass traditional authentication controls, maintain long-term persistence, and perform privilege escalation within cloud environments. The threat leverages techniques such as consent phishing (T1566, T1204.001), token manipulation (T1550, T1550.001), and application impersonation (T1534). Detection is challenging due to the legitimate appearance of these apps and the complexity of OAuth flows. The report concludes with defense strategies including continuous monitoring of OAuth app registrations, implementing strict consent policies, and leveraging automated detection tools like OAuth Apps Scout to identify anomalous or suspicious OAuth applications.
Potential Impact
Organizations worldwide using Microsoft Entra ID and OAuth-based integrations face significant risks from these malicious OAuth apps. Successful exploitation can lead to unauthorized access to sensitive data, persistent footholds within cloud environments, and privilege escalation, potentially enabling lateral movement and data exfiltration. The blending of malicious apps with legitimate ones complicates detection, increasing dwell time and the likelihood of extensive compromise. This threat undermines identity security and cloud trust models, impacting confidentiality, integrity, and availability of organizational resources. Enterprises relying heavily on SaaS applications and cloud identity providers are particularly vulnerable, as attackers exploit user consent mechanisms to bypass traditional security controls. The medium severity reflects the threat's potential to cause moderate to severe damage, especially in environments lacking robust OAuth app governance and monitoring. The absence of known exploits in the wild suggests emerging but actively developing campaigns, warranting proactive defense measures.
Mitigation Recommendations
Organizations should implement a multi-layered defense strategy tailored to OAuth app security. First, enforce strict OAuth consent policies limiting app permissions to the minimum necessary and require admin consent for high-risk scopes. Regularly audit and inventory all registered OAuth applications within Entra ID to identify unauthorized or suspicious apps. Deploy automated detection tools such as OAuth Apps Scout or similar solutions that analyze app metadata, consent patterns, and behavioral anomalies to flag malicious apps early. Educate users about the risks of granting OAuth app permissions, emphasizing caution with consent prompts, especially those mimicking trusted brands. Integrate OAuth app monitoring with Security Information and Event Management (SIEM) systems to correlate suspicious activities. Implement conditional access policies to restrict OAuth app usage based on risk factors such as user location, device compliance, and sign-in risk. Consider leveraging Microsoft Defender for Identity and Cloud App Security features to detect anomalous OAuth app behaviors. Finally, establish incident response playbooks specifically addressing OAuth consent abuse scenarios to enable rapid containment and remediation.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, India, Netherlands, Sweden, Singapore
Indicators of Compromise
- url: http://officemtr.com:8081/office
- url: http://ynapaletsteamworkspace.myclickfunnels.com/
- domain: anchorsgordon.com
- domain: aquaphalts.com
- domain: ceyanos.info
- domain: cooltekinc.com
- domain: cooltekllc.com
- domain: creiamc.com
- domain: creicapital.com
- domain: dgm-f.org
- domain: dustdevilbaseball.com
- domain: ekistruct.com
- domain: experienccolumbiasc.com
- domain: fpwd.com
- domain: greenpole-ps.com
- domain: i-businessplan.com
- domain: ibusinessplan.com
- domain: ieng-group.com
- domain: ieng.group
- domain: killlpack.com
- domain: kkodd.co
- domain: ledconsultinglc.com
- domain: lnsrc.org
- domain: mediabrushmarketings.com
- domain: michaelselectrics.com
- domain: ncerc.org
- domain: noknok-inc.co
- domain: noknok.co
- domain: noknokgroceries.com
- domain: officemtr.com
- domain: summitcountysco.com
- domain: thermion.se
- domain: times-7.com
- domain: twothirtythree.co
- domain: wallsofttech.com
- domain: wgarnett.com
- domain: sharepoint.microzoftonline.com
- domain: ynapaletsteamworkspace.myclickfunnels.com
Uncovering Malicious OAuth Campaigns in Entra ID
Description
This analysis reveals the growing threat of malicious OAuth applications in Microsoft Entra ID, which attackers use for persistence and privilege escalation. The report details how these apps blend in with legitimate integrations, making detection challenging. It describes the creation of OAuth Apps Scout, an automated detection pipeline that identifies emerging malicious OAuth apps. The research uncovered multiple campaigns, including one involving 19 apps impersonating well-known brands. The report compares tactics from 2019 to 2025, showing an evolution in attacker strategies from Microsoft impersonation to third-party SaaS spoofing. It concludes with actionable defense strategies for organizations to protect against these threats.
AI-Powered Analysis
Technical Analysis
This threat involves malicious OAuth applications targeting Microsoft Entra ID (formerly Azure Active Directory) environments. Attackers create OAuth apps that request permissions to access organizational resources, leveraging OAuth consent flows to gain persistent access and escalate privileges. These malicious apps are crafted to closely resemble legitimate integrations, including impersonation of well-known brands and SaaS providers, making them difficult to detect through conventional means. The research highlights a shift in attacker tactics from 2019 to 2025, moving from direct Microsoft impersonation to more sophisticated third-party SaaS spoofing. The OAuth Apps Scout automated detection pipeline was developed to identify emerging malicious OAuth apps by analyzing app metadata, consent patterns, and behavioral indicators. The campaigns uncovered include one with 19 malicious apps impersonating trusted brands to deceive users into granting consent. The abuse of OAuth consent mechanisms enables attackers to bypass traditional authentication controls, maintain long-term persistence, and perform privilege escalation within cloud environments. The threat leverages techniques such as consent phishing (T1566, T1204.001), token manipulation (T1550, T1550.001), and application impersonation (T1534). Detection is challenging due to the legitimate appearance of these apps and the complexity of OAuth flows. The report concludes with defense strategies including continuous monitoring of OAuth app registrations, implementing strict consent policies, and leveraging automated detection tools like OAuth Apps Scout to identify anomalous or suspicious OAuth applications.
Potential Impact
Organizations worldwide using Microsoft Entra ID and OAuth-based integrations face significant risks from these malicious OAuth apps. Successful exploitation can lead to unauthorized access to sensitive data, persistent footholds within cloud environments, and privilege escalation, potentially enabling lateral movement and data exfiltration. The blending of malicious apps with legitimate ones complicates detection, increasing dwell time and the likelihood of extensive compromise. This threat undermines identity security and cloud trust models, impacting confidentiality, integrity, and availability of organizational resources. Enterprises relying heavily on SaaS applications and cloud identity providers are particularly vulnerable, as attackers exploit user consent mechanisms to bypass traditional security controls. The medium severity reflects the threat's potential to cause moderate to severe damage, especially in environments lacking robust OAuth app governance and monitoring. The absence of known exploits in the wild suggests emerging but actively developing campaigns, warranting proactive defense measures.
Mitigation Recommendations
Organizations should implement a multi-layered defense strategy tailored to OAuth app security. First, enforce strict OAuth consent policies limiting app permissions to the minimum necessary and require admin consent for high-risk scopes. Regularly audit and inventory all registered OAuth applications within Entra ID to identify unauthorized or suspicious apps. Deploy automated detection tools such as OAuth Apps Scout or similar solutions that analyze app metadata, consent patterns, and behavioral anomalies to flag malicious apps early. Educate users about the risks of granting OAuth app permissions, emphasizing caution with consent prompts, especially those mimicking trusted brands. Integrate OAuth app monitoring with Security Information and Event Management (SIEM) systems to correlate suspicious activities. Implement conditional access policies to restrict OAuth app usage based on risk factors such as user location, device compliance, and sign-in risk. Consider leveraging Microsoft Defender for Identity and Cloud App Security features to detect anomalous OAuth app behaviors. Finally, establish incident response playbooks specifically addressing OAuth consent abuse scenarios to enable rapid containment and remediation.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.wiz.io/blog/detecting-malicious-oauth-applications"]
- Adversary
- null
- Pulse Id
- 6996ee44a7b3d1015da4ed4b
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://officemtr.com:8081/office | — | |
urlhttp://ynapaletsteamworkspace.myclickfunnels.com/ | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainanchorsgordon.com | — | |
domainaquaphalts.com | — | |
domainceyanos.info | — | |
domaincooltekinc.com | — | |
domaincooltekllc.com | — | |
domaincreiamc.com | — | |
domaincreicapital.com | — | |
domaindgm-f.org | — | |
domaindustdevilbaseball.com | — | |
domainekistruct.com | — | |
domainexperienccolumbiasc.com | — | |
domainfpwd.com | — | |
domaingreenpole-ps.com | — | |
domaini-businessplan.com | — | |
domainibusinessplan.com | — | |
domainieng-group.com | — | |
domainieng.group | — | |
domainkilllpack.com | — | |
domainkkodd.co | — | |
domainledconsultinglc.com | — | |
domainlnsrc.org | — | |
domainmediabrushmarketings.com | — | |
domainmichaelselectrics.com | — | |
domainncerc.org | — | |
domainnoknok-inc.co | — | |
domainnoknok.co | — | |
domainnoknokgroceries.com | — | |
domainofficemtr.com | — | |
domainsummitcountysco.com | — | |
domainthermion.se | — | |
domaintimes-7.com | — | |
domaintwothirtythree.co | — | |
domainwallsofttech.com | — | |
domainwgarnett.com | — | |
domainsharepoint.microzoftonline.com | — | |
domainynapaletsteamworkspace.myclickfunnels.com | — |
Threat ID: 69970717b557332a80d4689b
Added to database: 2/19/2026, 12:50:31 PM
Last enriched: 2/19/2026, 1:06:42 PM
Last updated: 2/20/2026, 3:08:14 AM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
DNS Used to Hide Fake Investment Platform Schemes
MediumUncovering Malicious Cryptocurrency Scam Domains and Hacked YouTube Channels
MediumFake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis
MediumInvitation to Trouble: The Rise of Calendar Phishing Attacks
MediumBanners, Bots and Butchers: The AI-Driven Long Con in Asia
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.