Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Xai and Grok apologise for “terrifying behaviour”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian hackers abuse Microsoft OAuth to target Ukrainian allies via signal and WhatsApp
Identity

Russian hackers abuse Microsoft OAuth to target Ukrainian allies via signal and WhatsApp

userBy userApril 23, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Russian hackers take advantage of Microsoft Oauth

Several suspicious Russia-related threat actors have “actively” targeted individuals and organizations with human rights ties with the aim of gaining unauthorized access to Microsoft 365 accounts since early March 2025.

A highly targeted social engineering operation is a shift from previously documented attacks that, by one person, utilized a technique known as device code phishing to achieve the same goal, indicating that Russian enemies are actively improving trade.

“Threat actors have to persuade them to click on the link to send back Microsoft-generated code, so these recently observed attacks rely heavily on one-on-one interaction with the target,” security researchers Charlie Gardner, Josh Duke, Matthew Meltzer, Sean Cossel, Stephen Adair and Tom Lancaster said in their exclusive analysis.

At least two different threat clusters tracked as UTA0352 and UTA0355 are rated as behind the attack, but the possibility of APT29, UTA0304, and UTA0307 also not ruled out.

The latest set of attacks is characterized by the use of new techniques aimed at abusing legitimate Microsoft OAuth 2.0 authentication workflows. Threat actors are known to be officials from various European countries and in at least one case they will use the Ukrainian government’s compromise to trick victims and provide Microsoft-generated OAuth code to manage their accounts.

Cybersecurity

Messaging apps such as Signal and WhatsApp are used to contact targets, join video calls, register for private meetings with various European political staff, and sign up for upcoming events, mainly in Ukraine. These efforts are attempting to dupe the victim to click on a link hosted on Microsoft 365 infrastructure.

“If the target responds to a message, the conversation quickly advances towards actually scheduling the agreed time of the meeting,” Volexity says. “As the agreed meeting time approaches, European political officials will be contacted again and share instructions on how to participate in the meeting.”

Russian hackers take advantage of Microsoft Oauth

The instructions take the form of a document, and then the expected official will send a link to the target to join the meeting. All of these URLs will be redirected to the official Microsoft 365 login portal.

Specifically, the attached link is designed to redirect to the official Microsoft URL and generate a Microsoft Authorization token in the process, which is displayed in part of the URI or within the body of the redirected page. The attack then attempts to trick the victim into sharing code with threat actors.

This is achieved by redirecting authenticated users to the in-browser version of Visual Studio Code in Insiders.vscode.[.]Where the token is displayed to the user. If the victim shares the OAUTH code, UTA0352 will eventually generate an access token that grants access to the victim’s M365 account.

Volexity said it also observed previous iterations of the campaign redirecting users to the website “vscode-redirect.azurewebsites.”[.]Net, “This redirects to the localhost IP address (127.0.0.1).

Russian hackers take advantage of Microsoft Oauth

“When this happens, instead of introducing a user interface using an authentication code, the code is only available at URLs,” the researchers explained. “This will generate a blank page when rendered in the user’s browser. The attacker must request that the user share the URL from the browser in order for the attacker to retrieve the code.”

Another social engineering attack, identified in early April 2025, allegedly involved UTA0355, who used an already compromised Ukrainian government email account to send Spear-Phishing emails to targets, then sent messages to Signal and WhatsApp.

These messages invited targets to video conferences relating to Ukraine’s efforts on investment and prosecution in collaboration between “Atrocity Crimes” and international partners. The ultimate intention of the activity is the same as UTA0352, but there are important differences.

Threat actors, like other examples, misuse legitimate Microsoft 365 authentication APIs to access victim email data. However, the stolen OAuth Authorization code is used to permanently register the new device with the victim’s Microsoft Entra ID (formerly Azure Active Directory).

Cybersecurity

In the next phase, the attacker coordinates the second round of social engineering to approve the two-factor authentication request and convince the target to hijack the account.

“In this interaction, UTA0355 requested that the victim approve a two-factor authentication (2FA) request to “get access to the SharePoint instance associated with the meeting,” Volexity said. “This was necessary to bypass the additional security requirements introduced by the victim’s organization in order to access email.”

To detect and mitigate these attacks, organizations are encouraged to implement conditional access policies that audit newly registered devices, educate users about risks associated with unsolicited contacts on the messaging platform, and restrict access to organizational resources to only authorized or managed devices.

“These recent campaigns benefit from all user interactions taking place on Microsoft’s official infrastructure. There is no attacker-hosted infrastructure used in these attacks,” the company added.

“Similarly, these attacks do not include malicious or attacker-controlled OAuth applications that explicitly grant access (and thus may be easily blocked by an organization). The use of already-accepted first-party applications from Microsoft proves that preventing and detecting this technology is quite difficult.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBacteria that kill the material creates an antibacterial coating
Next Article Reftech and Venuiq work together to streamline event technology
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Xai and Grok apologise for “terrifying behaviour”

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.