Description
Cybercriminals are exploiting malicious Microsoft OAuth applications disguised as Adobe and DocuSign apps to compromise Microsoft 365 accounts. These apps are designed to gain access to user profiles and email information, which attackers then leverage for further malicious activity, such as phishing campaigns and malware distribution. Researchers from Proofpoint uncovered these highly targeted campaigns, which have primarily affected government, healthcare, supply chain, and retail industries across the U.S. and Europe.
Attack Details
The malicious OAuth apps impersonate legitimate applications like:
These applications request access to seemingly low-risk permissions, such as:
Attackers distribute phishing emails from compromised email accounts belonging to charities and small businesses, often using Office 365 accounts. The phishing emails typically use lures such as Requests for Proposals (RFPs) and contract-related documents to convince users to grant OAuth permissions.
Once permission is granted, victims are redirected through multiple stages before reaching a phishing page that attempts to steal Microsoft 365 credentials or deploy malware. In some cases, users are redirected to a fake Office 365 login page hosted on a malicious domain. Proofpoint researchers detected suspicious login attempts to victims’ accounts within a minute of authorization.
This attack leverages the ClickFix social engineering technique, a well-known method that deceives users into believing they are resolving an issue by clicking on seemingly harmless links.
Remediation
By implementing these security measures, organizations can mitigate the risk of unauthorized OAuth app permissions and safeguard their Microsoft 365 accounts from compromise.
For Individual Users:
For Microsoft 365 Administrators:
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: Malicious Adobe, DocuSign OAuth apps target Microsoft 365 accounts
References