Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chang’e 6 satellite samples reveal solid ground for lunar base

Microsoft warns that OAuth redirect abuse can deliver malware to government targets

Exposure to PFAS is associated with accelerated biological aging in men

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft warns that OAuth redirect abuse can deliver malware to government targets
Identity

Microsoft warns that OAuth redirect abuse can deliver malware to government targets

userBy userMarch 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 3, 2026Phishing/Malware

Microsoft on Monday warned of phishing campaigns that utilize phishing emails and OAuth URL redirection mechanisms to bypass traditional phishing defenses implemented in email and browsers.

The company says the campaign targets government and public sector organizations, and the ultimate goal is to redirect victims to attacker-controlled infrastructure without stealing their tokens. This phishing attack is described as an identity-based threat that exploits OAuth’s standard design behavior, rather than exploiting software vulnerabilities or stealing credentials.

According to the Microsoft Defender Security Research Team, “OAuth includes legitimate functionality that allows identity providers to redirect users to specific landing pages under certain conditions, typically error scenarios or other defined flows.”

“An attacker can exploit this native functionality by constructing a URL using popular identity providers such as Entra ID or Google Workspace, which uses manipulated parameters and an associated malicious application to redirect the user to an attacker-controlled landing page. This technique allows the creation of URLs that appear benign but ultimately lead to malicious destinations.”

The starting point for an attack is a malicious application created by a threat actor within a managed tenant. The application is configured with a redirect URL pointing to a malicious domain hosting malware. The attacker then distributes an OAuth phishing link that instructs the recipient to authenticate to the malicious application using an intentionally invalid scope.

This redirection results in users accidentally downloading and infecting their devices with malware. According to Microsoft, the malicious payload is distributed in the form of a ZIP archive and, when unzipped, causes PowerShell execution, sideloading of DLLs, pre-ransom activities and keyboard interactions.

The ZIP file contains a Windows shortcut (LNK) that runs a PowerShell command as soon as you open it. PowerShell payloads are used to run discovery commands and perform reconnaissance on hosts. The LNK file extracts the MSI installer from the ZIP archive and then drops a decoy document to mislead the victim. Meanwhile, a malicious DLL (“crashhandler.dll”) is sideloaded using the legitimate “steam_monitor.exe” binary.

The DLL proceeds to decrypt another file named “crashlog.dat” and executes the final payload in memory, allowing it to establish an outbound connection to an external command and control (C2) server.

Microsoft says these emails lure in electronic signature requests, Teams recordings, and social security, financial, and political themes in an attempt to trick users into clicking on links. The emails are said to have been sent via mass sending tools and custom solutions developed in Python and Node.js. The link can be included directly in the email body or placed within the PDF document.

“To increase credibility, the attacker used various encoding techniques to pass the target’s email address through the state parameter so that it would be automatically populated on the phishing page,” Microsoft said. “The state parameter is randomly generated and is intended to be used to correlate request and response values, but in this case it was reused to convey an encoded email address.”

Some campaigns have been found to leverage this technique to deliver malware, while others send users to pages hosted on phishing frameworks such as EvilProxy, which act as man-in-the-middle (AitM) kits that intercept credentials and session cookies.

Microsoft has since removed several malicious OAuth applications identified as part of the investigation. We recommend that organizations limit user consent, regularly review application permissions, and remove apps with unused or excessive permissions.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleExposure to PFAS is associated with accelerated biological aging in men
Next Article Chang’e 6 satellite samples reveal solid ground for lunar base
user
  • Website

Related Posts

Google confirms CVE-2026-21385 in Qualcomm Android component has been exploited

March 3, 2026

SloppyLemming uses dual malware chain to target Pakistan and Bangladesh governments

March 3, 2026

New Chrome vulnerability allows malicious extension to escalate privileges via Gemini panel

March 2, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chang’e 6 satellite samples reveal solid ground for lunar base

Microsoft warns that OAuth redirect abuse can deliver malware to government targets

Exposure to PFAS is associated with accelerated biological aging in men

The Longitude Prize on Dementia

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.