Experts Comments: Office365 Accounts Compromised Using OAuth

A recently discovered phishing campaign uses a novel approach to infiltrating Office365 accounts: through the Microsoft OAuth API. This continues a trend of hackers exploiting recognizable software companies in order to convince users to accept malware, including another Microsoft vulnerability that compromised account tokens.

Experts Comments

December 11, 2019
Sudhakar Ramakrishna
CEO
Pulse Secure
Targeting OAuth apps demonstrates how well hackers are going after all possible attack vectors, especially ones that imitate known, popular applications to trick users into accepting malware or providing credentials. By focusing on hijacking permission token, rather than directly stealing login credentials, the malware covertly accesses user accounts. Best practice to mitigate this attack is through a Zero Trust model that coordinates policies and controls for application access, single.....Read More
Targeting OAuth apps demonstrates how well hackers are going after all possible attack vectors, especially ones that imitate known, popular applications to trick users into accepting malware or providing credentials. By focusing on hijacking permission token, rather than directly stealing login credentials, the malware covertly accesses user accounts. Best practice to mitigate this attack is through a Zero Trust model that coordinates policies and controls for application access, single sign-on, multi-factor authentication factors, device posture checking and internet filtering. Zero Trust also requires continuous re-verification of add-ins, applications and endpoint defenses, so even “trusted” entities are consistently vetted, thereby making it more difficult for malware to infiltrate protected systems.  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.