Back to Hub

State Hackers Exploit OAuth Redirects to Breach Government Systems

Imagen generada por IA para: Hackers estatales explotan redirecciones OAuth para vulnerar sistemas gubernamentales

A new frontier in cyber-espionage has emerged, with state-backed hackers now systematically exploiting a fundamental trust mechanism of the modern web—OAuth—to bypass even the most robust defenses. Microsoft's Threat Intelligence team has uncovered a sophisticated campaign, attributed to an advanced persistent threat (APT) group tracked as SloppyLemming, that is leveraging malicious OAuth application consent grants to infiltrate government networks in South Asia. This technique marks a dangerous pivot from traditional credential phishing, allowing attackers to operate with authorized access tokens rather than stolen passwords, effectively neutralizing multi-factor authentication (MFA) protections.

The attack chain begins with highly targeted phishing emails, crafted to appear as legitimate government or internal communications, sent to officials in Pakistan and Bangladesh. Instead of directing victims to a fake login page, the emails contain links that initiate an OAuth authorization flow. The user is redirected to a perfectly spoofed Microsoft login page, which then requests consent for a malicious application—often disguised as a legitimate productivity or security tool—to access the user's Microsoft 365 data, including mail, calendar, and contacts.

This is the critical bypass. When a user clicks "Accept," they are not giving away their password; they are granting a registered OAuth application a set of delegated permissions. The threat actors behind SloppyLemming have pre-registered these malicious apps in Azure AD (now Entra ID). The consent grant provides them with an OAuth refresh token, which can be used to generate new access tokens for the Microsoft Graph API or other resources, all without the user's password or MFA token ever being required again. The attack exploits the inherent trust that systems place in OAuth tokens, which are designed to represent a user's consent.

Microsoft's investigation indicates that once initial access is secured via this OAuth abuse, the attackers deploy a dual-malware strategy to entrench themselves within the victim's environment. The first stage involves a downloader, a lightweight piece of malware designed to fetch and execute additional payloads from attacker-controlled command-and-control (C2) servers. The second, more persistent payload is a full-featured backdoor, capable of file exfiltration, executing remote commands, and providing long-term access to the compromised system. This layered approach allows the group to maintain persistence even if the initial OAuth application is discovered and revoked.

The implications for enterprise and government security are profound. For years, security teams have championed MFA as a near-impenetrable barrier against account takeover. This campaign demonstrates that when attackers shift their focus from stealing credentials to manipulating authorization flows, MFA alone is insufficient. The attack also evades traditional email security gateways that scan for malicious attachments or links to known phishing sites, as the initial link often points to a legitimate-looking domain used for the OAuth redirect.

Defending against this novel threat requires a shift in strategy. Microsoft and security experts recommend several key actions:

  1. Audit OAuth Applications: Administrators must regularly review consented applications in their Entra ID (Azure AD) tenant, paying close attention to those with high-permission levels and unfamiliar publishers. Suspicious applications should be revoked immediately.
  2. Implement Conditional Access Policies: Policies should be configured to restrict token issuance based on device compliance, trusted network locations, and user risk levels. This can prevent an attacker from using a token from an unfamiliar device or location.
  3. Enforce Admin Consent Workflows: Disable user consent for high-privilege permissions or for applications from untrusted publishers. Require all such consents to go through an administrative review process.
  4. User Awareness Training: Educate employees, especially those in high-risk roles, about this new phishing variant. The key message is to scrutinize permission requests for applications, not just login pages. They should be trained to report any unexpected consent screens.
  5. Monitor for Anomalous Token Usage: Security operations should incorporate analytics to detect unusual patterns in OAuth token usage, such as tokens being used from new geographies or for accessing large volumes of data in a short time.

The SloppyLemming campaign is a stark reminder that as defenses evolve, so do adversaries. The abuse of OAuth and cloud identity systems represents a significant escalation in the cyber-espionage playbook, moving the battlefield from the network perimeter to the core identity layer. For government agencies and enterprises worldwide, securing identity is no longer just about strong passwords and MFA—it's about governing the very permissions that users grant to the applications they use.

Original sources

NewsSearcher

This article was generated by our NewsSearcher AI system, analyzing information from multiple reliable sources.

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

The Hacker News
View source

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

The Hacker News
View source

⚠️ Sources used as reference. CSRaid is not responsible for external site content.

This article was written with AI assistance and reviewed by our editorial team.

Comentarios 0

¡Únete a la conversación!

Sé el primero en compartir tu opinión sobre este artículo.