Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Russian hackers abuse Microsoft OAuth to target Ukrainian allies via signal and WhatsApp
Identity

Russian hackers abuse Microsoft OAuth to target Ukrainian allies via signal and WhatsApp

userBy userApril 23, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Russian hackers take advantage of Microsoft Oauth

Several suspicious Russia-related threat actors have “actively” targeted individuals and organizations with human rights ties with the aim of gaining unauthorized access to Microsoft 365 accounts since early March 2025.

A highly targeted social engineering operation is a shift from previously documented attacks that, by one person, utilized a technique known as device code phishing to achieve the same goal, indicating that Russian enemies are actively improving trade.

“Threat actors have to persuade them to click on the link to send back Microsoft-generated code, so these recently observed attacks rely heavily on one-on-one interaction with the target,” security researchers Charlie Gardner, Josh Duke, Matthew Meltzer, Sean Cossel, Stephen Adair and Tom Lancaster said in their exclusive analysis.

At least two different threat clusters tracked as UTA0352 and UTA0355 are rated as behind the attack, but the possibility of APT29, UTA0304, and UTA0307 also not ruled out.

The latest set of attacks is characterized by the use of new techniques aimed at abusing legitimate Microsoft OAuth 2.0 authentication workflows. Threat actors are known to be officials from various European countries and in at least one case they will use the Ukrainian government’s compromise to trick victims and provide Microsoft-generated OAuth code to manage their accounts.

Cybersecurity

Messaging apps such as Signal and WhatsApp are used to contact targets, join video calls, register for private meetings with various European political staff, and sign up for upcoming events, mainly in Ukraine. These efforts are attempting to dupe the victim to click on a link hosted on Microsoft 365 infrastructure.

“If the target responds to a message, the conversation quickly advances towards actually scheduling the agreed time of the meeting,” Volexity says. “As the agreed meeting time approaches, European political officials will be contacted again and share instructions on how to participate in the meeting.”

Russian hackers take advantage of Microsoft Oauth

The instructions take the form of a document, and then the expected official will send a link to the target to join the meeting. All of these URLs will be redirected to the official Microsoft 365 login portal.

Specifically, the attached link is designed to redirect to the official Microsoft URL and generate a Microsoft Authorization token in the process, which is displayed in part of the URI or within the body of the redirected page. The attack then attempts to trick the victim into sharing code with threat actors.

This is achieved by redirecting authenticated users to the in-browser version of Visual Studio Code in Insiders.vscode.[.]Where the token is displayed to the user. If the victim shares the OAUTH code, UTA0352 will eventually generate an access token that grants access to the victim’s M365 account.

Volexity said it also observed previous iterations of the campaign redirecting users to the website “vscode-redirect.azurewebsites.”[.]Net, “This redirects to the localhost IP address (127.0.0.1).

Russian hackers take advantage of Microsoft Oauth

“When this happens, instead of introducing a user interface using an authentication code, the code is only available at URLs,” the researchers explained. “This will generate a blank page when rendered in the user’s browser. The attacker must request that the user share the URL from the browser in order for the attacker to retrieve the code.”

Another social engineering attack, identified in early April 2025, allegedly involved UTA0355, who used an already compromised Ukrainian government email account to send Spear-Phishing emails to targets, then sent messages to Signal and WhatsApp.

These messages invited targets to video conferences relating to Ukraine’s efforts on investment and prosecution in collaboration between “Atrocity Crimes” and international partners. The ultimate intention of the activity is the same as UTA0352, but there are important differences.

Threat actors, like other examples, misuse legitimate Microsoft 365 authentication APIs to access victim email data. However, the stolen OAuth Authorization code is used to permanently register the new device with the victim’s Microsoft Entra ID (formerly Azure Active Directory).

Cybersecurity

In the next phase, the attacker coordinates the second round of social engineering to approve the two-factor authentication request and convince the target to hijack the account.

“In this interaction, UTA0355 requested that the victim approve a two-factor authentication (2FA) request to “get access to the SharePoint instance associated with the meeting,” Volexity said. “This was necessary to bypass the additional security requirements introduced by the victim’s organization in order to access email.”

To detect and mitigate these attacks, organizations are encouraged to implement conditional access policies that audit newly registered devices, educate users about risks associated with unsolicited contacts on the messaging platform, and restrict access to organizational resources to only authorized or managed devices.

“These recent campaigns benefit from all user interactions taking place on Microsoft’s official infrastructure. There is no attacker-hosted infrastructure used in these attacks,” the company added.

“Similarly, these attacks do not include malicious or attacker-controlled OAuth applications that explicitly grant access (and thus may be easily blocked by an organization). The use of already-accepted first-party applications from Microsoft proves that preventing and detecting this technology is quite difficult.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBacteria that kill the material creates an antibacterial coating
Next Article Reftech and Venuiq work together to streamline event technology
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

How a hardware wallet protects your private key: Security and safety instructions

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.