Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Fake OAuth Apps Breach Microsoft 365

August 4, 2025
Reading Time: 3 mins read
in Alerts
Fake OAuth Apps Breach Microsoft 365

Cybersecurity firm Proofpoint has reported on a new and ongoing attack cluster, first observed in early 2025, where threat actors are leveraging counterfeit Microsoft OAuth applications. These malicious applications are designed to impersonate well-known enterprises such as RingCentral, SharePoint, Adobe, and DocuSign to appear legitimate. The primary objective of this campaign is to perform account takeovers by harvesting user credentials from Microsoft 365 accounts. The attack relies on sophisticated phishing kits like Tycoon and ODx, which are specifically engineered to defeat security measures like multi-factor authentication (MFA).

The attack chain begins with a carefully crafted phishing email, often sent from a previously compromised account to enhance its credibility. These emails use business-oriented pretexts, such as requests for quotes (RFQs) or contract agreements, to entice the recipient into clicking a malicious URL. Upon clicking the link, the victim is directed not to a fake login page, but to a legitimate Microsoft OAuth consent screen for a fraudulent application, such as one named “iLSMART,” which impersonates a real-world aviation marketplace. This step is designed to lower the user’s guard by leveraging Microsoft’s own trusted domain.

A notable aspect of this attack is its persistence and layered deception.

After the user interacts with the OAuth consent prompt—regardless of whether they accept or deny the requested permissions—they are funneled through a CAPTCHA verification page. Once complete, they are finally redirected to a fake Microsoft authentication page. This page is powered by an Adversary-in-the-Middle (AitM) framework from a Phishing-as-a-Service (PhaaS) platform known as Tycoon. This AitM setup acts as a proxy, intercepting the communication between the user and the real Microsoft service to capture not only their username and password but also the session cookies and MFA codes needed to bypass security.

The scale of this operation is significant, with Proofpoint observing over 50 different impersonated applications used in these campaigns. The underlying Tycoon toolkit is responsible for a substantial volume of attacks, with attempted compromises affecting nearly 3,000 user accounts across more than 900 separate Microsoft 365 environments in 2025 alone. In response to this and similar threats, Microsoft has announced plans to implement security updates by August 2025. These changes will block legacy authentication protocols and require administrator consent for third-party app access, a move that is expected to significantly disrupt this type of attack vector.

This OAuth-based attack is part of a broader landscape of evolving threats targeting corporate users. The provided research also highlights other concurrent campaigns, such as spear-phishing emails deploying keyloggers and spam operations that embed links to Remote Monitoring and Management (RMM) software within PDF documents. These RMM tools, often disguised as necessary programs to view invoices or contracts, provide attackers with an initial foothold into a network, which is a favored tactic for ransomware operators and other malicious actors seeking to escalate their privileges and execute further attacks.

Reference:

  • Attackers Use Fake OAuth Apps and Tycoon Kit to Compromise Microsoft 365 Accounts
Tags: August 2025Cyber AlertsCyber Alerts 2025CyberattackCybersecurity
ADVERTISEMENT

Related Posts

BatShadow Unleashes Go Vampire Bot

BatShadow Unleashes Go Vampire Bot

October 10, 2025
BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

October 10, 2025
Redis Use After Free Bug Enables RCE

FileFix Attack Evades Security Tools

October 10, 2025
Hackers Abuse WordPress for Phishing

Hackers Abuse WordPress for Phishing

October 10, 2025
Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

October 10, 2025
Hackers Abuse WordPress for Phishing

Android Spyware ClayRat Imitates Apps

October 10, 2025

Latest Alerts

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

Android Spyware ClayRat Imitates Apps

Subscribe to our newsletter

    Latest Incidents

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    Dozens Hit in Oracle-Linked Hacks

    BK Technologies Admits Cyber Breach

    Chinese Hackers Hit Williams Connolly

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial