Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Hackers abuse OAuth error flows to spread malware
    Cybersecurity

    Hackers abuse OAuth error flows to spread malware

    adminBy adminMarch 4, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Phishing
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Phishing

    Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages.

    The attacks target government and public-sector organizations with phishing links that prompt users to authenticate to a malicious application, Microsoft Defender researchers say.

    with e-signature requests, Social Security notices, meeting invitations, password resets, or various financial and political topics that contain OAuth redirect URLs. Sometimes, the URLs are embedded in PDF files to evade detection.

    Microsoft 365 account warning lure
    Microsoft 365 account warning lure
    Source: Microsoft

    Forcing risky redirections

    OAuth applications are registered with an identity provider, such as Microsoft Entra ID, and leverage the OAuth 2.0 protocol to obtain delegated or application-level access to user data and resources.

    In the campaigns observed by Microsoft, the attackers create malicious OAuth applications in a tenant they control and configure them with a redirect URI pointing to their infrastructure.

    The researchers say that even if the URLs for Entra ID look like legitimate authorization requests, the endpoint is invoked with parameters for silent authentication without an interactive login and an invalid scope that triggers authentication errors. This forces the identity provider to redirect users to the redirect URI configured by the attacker.

    In some cases, the victims are redirected to phishing pages powered by attacker-in-the-middle frameworks such as EvilProxy, which can intercept valid session cookies to bypass multi-factor authentication (MFA) protections.

    Microsoft found that the ‘state’ parameter was misused to auto-fill the victim’s email address in the credentials box on the phishing page, increasing the perceived sense of legitimacy.

    OAuth redirect attack overview
    OAuth redirect attack overview
    Source: Microsoft

    In other instances, the victims are redirected to a ‘/download’ path that automatically delivers a ZIP file with malicious shortcut (.LNK) files and HTML smuggling tools.

    Opening the .LNK launches PowerShell, which performs reconnaissance on the compromised host and extracts the components required for the next step, DLL side-loading.

    A malicious DLL (crashhandler.dll) decrypts and loads the final payload (crashlog.dat) into memory, while a legitimate executable (stream_monitor.exe) loads a decoy to distract the victim.

    The malware attack chain
    The malware attack chain
    Source: Microsoft

    Microsoft suggests that organizations should tighten permissions for OAuth applications, enforce strong identity protections and Conditional Access policies, and use cross-domain detection across email, identity, and endpoints.

    The company highlights that the observed attacks are identity-based threats that abuse an intended behavior in the OAuth framework that behaves as specified by the standard defining how authorization errors are managed through redirects.

    The researchers warn that threat actors are now triggering OAuth errors through invalid parameters, such as scope or prompt=none, to force silent error redirects as part of real-world attacks.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    Abuse Error flows hackers Malware OAuth spread
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleIs This the Best Accounting Software for Small Business Owners?
    Next Article Phone by Google 210.1.877624726-pixel APK Download by Google LLC
    admin
    • Website

    Related Posts

    Digital.ai expands post-build protection for Android and iOS applications

    March 4, 2026

    How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

    March 4, 2026

    Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

    March 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Digital.ai expands post-build protection for Android and iOS applications

    March 4, 2026

    How Jamie I.F. is Recovering From a Drop From $100K/Month to $3K/Month

    March 4, 2026

    Google Zero Is A Lie

    March 4, 2026

    Phone by Google 210.1.877624726-pixel APK Download by Google LLC

    March 4, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (598)
    • Privacy & Online Earning (90)
    • SEO & Digital Marketing (376)
    • Tech Tools & Mobile / Apps (733)
    • WiFi / Internet & Networking (106)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Digital.ai expands post-build protection for Android and iOS applications

    March 4, 2026

    How Jamie I.F. is Recovering From a Drop From $100K/Month to $3K/Month

    March 4, 2026

    Google Zero Is A Lie

    March 4, 2026
    Most Popular
    • Digital.ai expands post-build protection for Android and iOS applications
    • How Jamie I.F. is Recovering From a Drop From $100K/Month to $3K/Month
    • Google Zero Is A Lie
    • Phone by Google 210.1.877624726-pixel APK Download by Google LLC
    • Hackers abuse OAuth error flows to spread malware
    • Is This the Best Accounting Software for Small Business Owners?
    • I tested XGIMI’s MemoMind One and they prove smart glasses don’t need a camera to be good
    • How Pirated Software Turns Helpful Employees Into Malware Delivery Agents
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.