Explorer

Microsoft Flags New OAuth-Based Phishing Attack Targeting Public Sector

Security researchers warn about a new phishing campaign abusing OAuth login redirects. The attack tricks identity systems into sending victims to malicious websites, making it harder for many security tools to detect.

Show Quick Read
Key points generated by AI, verified by newsroom

A new phishing campaign has been discovered that uses a clever trick inside the OAuth login system. Security researchers from Microsoft Defender say attackers are abusing the normal redirection feature of OAuth to send users to malicious websites. Unlike traditional phishing attacks that try to steal passwords or tokens directly, this method works differently. It triggers an error in the authentication process, so the system automatically redirects the victim’s browser. 

The campaign mainly targets government and public-sector organisations. Because the links use trusted identity provider domains, many security filters fail to detect the attack easily.

New OAuth Phishing Attack Uses Redirect Trick

This new OAuth phishing attack works by abusing the normal error-handling process defined in the OAuth standard. Attackers first register fake applications inside their own cloud tenants. They then configure redirect links that lead to domains they control.

Phishing emails are sent with special OAuth authorisation links. These links target the Microsoft Entra ID login endpoint and include parameters designed to break the login process. For example, attackers request an invalid permission, so the authentication attempt fails.

When the request fails, the identity system automatically redirects the browser to the attacker’s registered redirect link. Since this redirect is part of normal OAuth behaviour, many email and browser security systems do not block it.

Five-Stage Phishing Attack Chain Explained

Researchers say the campaign follows a five-stage phishing attack chain. First, attackers send phishing emails related to e-signatures, financial documents, or meeting invites. Automated tools help them send large numbers of messages.

Second, clicking the link triggers a silent OAuth check. The link may also contain the victim’s encoded email address.

Third, the authentication request fails, and the system redirects the user to the attacker’s website. Fourth, victims may be taken to phishing pages or prompted to download malicious ZIP files.

Finally, malware can run PowerShell commands, collect system information, and connect to attacker-controlled servers.

Frequently Asked Questions

How does this new OAuth phishing campaign work?

Attackers exploit the OAuth redirection feature. They trigger an authentication error, causing the system to redirect victims to malicious websites.

What makes this phishing attack difficult to detect?

The campaign uses trusted identity provider domains in its links. This bypasses many security filters that would normally block suspicious URLs.

What is the typical sequence of events in this five-stage phishing attack?

It involves phishing emails, a silent OAuth check, an authentication failure with redirection, landing on phishing pages or downloading malware, and finally, malware execution.

About the author Annie Sharma

Annie Sharma is a technology journalist at ABP Live English, focused on breaking down complex tech stories into clear, reader-friendly narratives. Gaining hands-on experience in digital storytelling and news writing with leading publications, Annie believes technology should feel accessible rather than overwhelming, and follows a clear, reader-first approach in her work.

For tips and queries, you can reach out to her at annies@abpnetwork.com.

Read
Advertisement

Top Headlines

Microsoft Flags New OAuth-Based Phishing Attack Targeting Public Sector
Microsoft Flags New OAuth-Based Phishing Attack Targeting Public Sector
Nothing Phone (4a) Spotted At MWC With New Colours Ahead Of March 5 Launch
Nothing Phone (4a) Spotted At MWC With New Colours Ahead Of March 5 Launch
iPhone 17 Pro Now Nearly Rs 20,000 Cheaper: Check How Buyers Can Unlock This Offer
iPhone 17 Pro Now Nearly Rs 20,000 Cheaper: Check How Buyers Can Unlock This Offer
Gadgets Review | Infinix Note Edge 5G: Curved Display Glam Meets Midrange Pragmatism
Infinix Note Edge 5G Review: Curved Display Glam Meets Midrange Pragmatism
Advertisement

Videos

Breaking News: Israel Intensifies Strikes on Iran’s Missile Launchers
Breaking News: PM Narendra Modi Addresses Media Alongside Canadian PM
Breaking News: Iran Continues Missile Attacks on Israeli Cities, Gulf Region Also Targeted
Breaking News: Protests Erupt in Srinagar, Police Use Tear Gas
Middle East Conflict Alert: Iran Strikes U.S. Bases and Israel with Missiles, Video Shows Extensive Military Arsenal
Advertisement

Photo Gallery

Advertisement
25°C
New Delhi
Rain: 100mm
Humidity: 97%
Wind: WNW 47km/h
See Today's Weather
powered by
Accu Weather
Embed widget