Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

EU project to accelerate hydrogen production in Norway

New RFP template for AI usage control and AI governance

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian hackers abuse Microsoft OAuth to target Ukrainian allies via signal and WhatsApp
Identity

Russian hackers abuse Microsoft OAuth to target Ukrainian allies via signal and WhatsApp

userBy userApril 23, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Russian hackers take advantage of Microsoft Oauth

Several suspicious Russia-related threat actors have “actively” targeted individuals and organizations with human rights ties with the aim of gaining unauthorized access to Microsoft 365 accounts since early March 2025.

A highly targeted social engineering operation is a shift from previously documented attacks that, by one person, utilized a technique known as device code phishing to achieve the same goal, indicating that Russian enemies are actively improving trade.

“Threat actors have to persuade them to click on the link to send back Microsoft-generated code, so these recently observed attacks rely heavily on one-on-one interaction with the target,” security researchers Charlie Gardner, Josh Duke, Matthew Meltzer, Sean Cossel, Stephen Adair and Tom Lancaster said in their exclusive analysis.

At least two different threat clusters tracked as UTA0352 and UTA0355 are rated as behind the attack, but the possibility of APT29, UTA0304, and UTA0307 also not ruled out.

The latest set of attacks is characterized by the use of new techniques aimed at abusing legitimate Microsoft OAuth 2.0 authentication workflows. Threat actors are known to be officials from various European countries and in at least one case they will use the Ukrainian government’s compromise to trick victims and provide Microsoft-generated OAuth code to manage their accounts.

Cybersecurity

Messaging apps such as Signal and WhatsApp are used to contact targets, join video calls, register for private meetings with various European political staff, and sign up for upcoming events, mainly in Ukraine. These efforts are attempting to dupe the victim to click on a link hosted on Microsoft 365 infrastructure.

“If the target responds to a message, the conversation quickly advances towards actually scheduling the agreed time of the meeting,” Volexity says. “As the agreed meeting time approaches, European political officials will be contacted again and share instructions on how to participate in the meeting.”

Russian hackers take advantage of Microsoft Oauth

The instructions take the form of a document, and then the expected official will send a link to the target to join the meeting. All of these URLs will be redirected to the official Microsoft 365 login portal.

Specifically, the attached link is designed to redirect to the official Microsoft URL and generate a Microsoft Authorization token in the process, which is displayed in part of the URI or within the body of the redirected page. The attack then attempts to trick the victim into sharing code with threat actors.

This is achieved by redirecting authenticated users to the in-browser version of Visual Studio Code in Insiders.vscode.[.]Where the token is displayed to the user. If the victim shares the OAUTH code, UTA0352 will eventually generate an access token that grants access to the victim’s M365 account.

Volexity said it also observed previous iterations of the campaign redirecting users to the website “vscode-redirect.azurewebsites.”[.]Net, “This redirects to the localhost IP address (news.fyself.com).

Russian hackers take advantage of Microsoft Oauth

“When this happens, instead of introducing a user interface using an authentication code, the code is only available at URLs,” the researchers explained. “This will generate a blank page when rendered in the user’s browser. The attacker must request that the user share the URL from the browser in order for the attacker to retrieve the code.”

Another social engineering attack, identified in early April 2025, allegedly involved UTA0355, who used an already compromised Ukrainian government email account to send Spear-Phishing emails to targets, then sent messages to Signal and WhatsApp.

These messages invited targets to video conferences relating to Ukraine’s efforts on investment and prosecution in collaboration between “Atrocity Crimes” and international partners. The ultimate intention of the activity is the same as UTA0352, but there are important differences.

Threat actors, like other examples, misuse legitimate Microsoft 365 authentication APIs to access victim email data. However, the stolen OAuth Authorization code is used to permanently register the new device with the victim’s Microsoft Entra ID (formerly Azure Active Directory).

Cybersecurity

In the next phase, the attacker coordinates the second round of social engineering to approve the two-factor authentication request and convince the target to hijack the account.

“In this interaction, UTA0355 requested that the victim approve a two-factor authentication (2FA) request to “get access to the SharePoint instance associated with the meeting,” Volexity said. “This was necessary to bypass the additional security requirements introduced by the victim’s organization in order to access email.”

To detect and mitigate these attacks, organizations are encouraged to implement conditional access policies that audit newly registered devices, educate users about risks associated with unsolicited contacts on the messaging platform, and restrict access to organizational resources to only authorized or managed devices.

“These recent campaigns benefit from all user interactions taking place on Microsoft’s official infrastructure. There is no attacker-hosted infrastructure used in these attacks,” the company added.

“Similarly, these attacks do not include malicious or attacker-controlled OAuth applications that explicitly grant access (and thus may be easily blocked by an organization). The use of already-accepted first-party applications from Microsoft proves that preventing and detecting this technology is quite difficult.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBacteria that kill the material creates an antibacterial coating
Next Article Reftech and Venuiq work together to streamline event technology
user
  • Website

Related Posts

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

March 4, 2026

New RFP template for AI usage control and AI governance

March 4, 2026

Fake Laravel packages on Packagist deploy RAT on Windows, macOS, and Linux

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

EU project to accelerate hydrogen production in Norway

New RFP template for AI usage control and AI governance

Inside the EU’s military innovation push

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.