Microsoft OAuth App Impersonation: MFA Phishing Tactics Explained
N2K NetworksJanuary 3, 202619 min317 views
22 connectionsΒ·34 entities in this videoβUnderstanding MFA Phishing
- π‘ Multi-factor authentication (MFA) phishing targets users by attempting to steal not just usernames and passwords, but also the second authentication factor.
- π Historically, MFA has been a strong defense, but threat actors are evolving to bypass it by capturing authentication tokens or session cookies.
- β οΈ MFA phishing kits provide threat actors with tools to impersonate legitimate login pages, making them appear authentic despite incorrect URLs.
The OAuth App Impersonation Campaign
- π― Threat actors are impersonating fake Microsoft OAuth applications to gain access and facilitate credential theft.
- π§ Lures often use business-relevant content like invoices, HR documents, or requests for quotes to trick users into clicking malicious links.
- βοΈ Clicking a link can lead to a fake Microsoft OAuth page requesting permissions. Even if the user clicks 'cancel', they are often redirected to a fake Microsoft login page to capture credentials and MFA tokens.
- π The research highlights campaigns impersonating services like Adobe, DocuSign, and SharePoint, targeting nearly 3,000 Microsoft 365 accounts.
Attacker-in-the-Middle and Tycoon Kit
- π€ The Tycoon fishing kit employs an adversary-in-the-middle technique, primarily targeting Microsoft 365 and Gmail.
- β‘ This technique uses cookies to circumvent MFA access controls by collecting username, password, and authentication tokens in real-time.
- π While the Tycoon kit can be high-volume, this specific campaign saw over two dozen malicious applications impersonating various services throughout 2025.
Success Rates and Evolving Threats
- π The success rate of these campaigns can be low, often depending heavily on the effectiveness of the social engineering and the quality of the email lures.
- π§ Threat actors are pivoting from high-volume botnets to more targeted attacks focusing on identity and access into cloud tenants, including MFA phishing and information stealers.
- β οΈ Microsoft is implementing security changes, such as blocking legacy authentication protocols and requiring admin consent for third-party app access, to combat these threats.
Recommendations for Protection
- π‘οΈ Organizations should implement robust email and cloud security measures.
- π User training and education, tailored to observed threats, are crucial for recognizing and avoiding phishing attempts.
- π Physical security keys (like YubiKey) are recommended over SMS or app-based MFA to further frustrate threat actors attempting to bypass authentication.
- π Web security solutions that can isolate malicious sessions and block access to malicious URLs are also vital.
Knowledge graph34 entities Β· 22 connections
How they connect
An interactive map of every person, idea, and reference from this conversation. Hover to trace connections, click to explore.
Hover Β· drag to explore
34 entities
Chapters9 moments
Key Moments
Transcript69 segments
Full Transcript
Topics13 themes
Whatβs Discussed
MFA PhishingMicrosoft OAuthCredential TheftTycoon Fishing KitAdversary-in-the-MiddleAuthentication TokensSession CookiesSocial EngineeringCloud SecurityUser TrainingPhysical Security KeysInformation StealersMicrosoft 365
Smart Objects34 Β· 22 links
ProductsΒ· 11
CompaniesΒ· 3
ConceptsΒ· 15
PeopleΒ· 4
MediaΒ· 1