{"id":66878,"date":"2023-12-13T15:48:08","date_gmt":"2023-12-13T19:48:08","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=66878"},"modified":"2023-12-13T15:48:16","modified_gmt":"2023-12-13T19:48:16","slug":"microsoft-identifies-surge-in-oauth-attacks-with-financial-motivations","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/microsoft-identifies-surge-in-oauth-attacks-with-financial-motivations\/","title":{"rendered":"Microsoft Identifies Surge in OAuth Attacks with Financial Motivations"},"content":{"rendered":"\n<p>Microsoft\u2019s security team has issued an advisory on the rising threat of OAuth attacks, which exploit compromised user accounts to perform illicit activities such as <a href=\"https:\/\/coinscreed.com\/staging\/pennsylvania-scraps-crypto-mining-ban-after-union-pressure.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">crypto mining<\/a> and spamming. The company advises organizations to strengthen their identity infrastructure and access policies to prevent such breaches.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"315\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/12\/Microsoft-crypto.jpg\" alt=\"Microsoft Identifies Surge in OAuth Attacks with Financial Motivations \" class=\"wp-image-66880\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/12\/Microsoft-crypto.jpg 600w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/12\/Microsoft-crypto-300x158.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/12\/Microsoft-crypto-18x9.jpg 18w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.geeksforgeeks.org\/what-is-oauth-open-authorization\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">OAuth<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> allows users to grant permissions to third-party applications without sharing their passwords. However, this also makes it a lucrative target for cybercriminals, who exploit hijacked user accounts to gain unauthorized access and privileges within various online platforms. <\/p>\n\n\n\n<p>This poses a serious risk to digital security and privacy.<\/p>\n\n\n\n<p>Cyber attackers use various methods, such as phishing and password-spraying, to compromise user accounts, especially those that lack strong authentication. Once they take over these accounts, they use them to install malicious OAuth applications, which can perform actions on behalf of the users. <\/p>\n\n\n\n<p>These actions include deploying virtual machines (VMs) for illicit activities like crypto mining, conducting Business Email Compromise (BEC) attacks, and launching massive spam campaigns using an organization\u2019s resources. <\/p>\n\n\n\n<p>The exploitation of OAuth applications through these means presents a complex challenge in the domain of cybersecurity.<\/p>\n\n\n\n<p><a href=\"https:\/\/coinscreed.com\/staging\/microsoft-bans-crypto-mining-on-cloud-services.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Microsoft<\/a> has been actively monitoring these activities and enhancing its detection capabilities of malicious OAuth applications. The company\u2019s efforts are led by tools such as Microsoft Defender for Cloud Apps, which helps prevent compromised accounts from accessing sensitive organizational data and assets.<\/p>\n\n\n\n<p>In response to these threats, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/12\/12\/threat-actors-misuse-oauth-applications-to-automate-financially-driven-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Microsoft has recommended<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> that organizations take several steps to bolster their defenses against such attacks. A key step is to strengthen their identity infrastructure. <\/p>\n\n\n\n<p>Microsoft\u2019s analysis revealed that most compromised accounts did not enable multifactor authentication (MFA), making them susceptible to credential-guessing attacks. The implementation of MFA is a vital measure to thwart such breaches.<\/p>\n\n\n\n<p>Besides MFA, Microsoft stresses the importance of conditional access policies and continuous access evaluation. These features are designed to revoke access immediately upon detecting potential risks, providing an extra layer of security. <\/p>\n\n\n\n<p>Microsoft also highlights the usefulness of its security defaults in Azure Active Directory, which benefits organizations using the free tier. <\/p>\n\n\n\n<p>These defaults include preconfigured security settings, such as MFA and safeguards for privileged activities.<\/p>\n\n\n\n<p>Furthermore, Microsoft advises organizations to conduct regular audits of apps and the permissions granted to them. This ensures compliance with the principles of least privilege, a fundamental concept of effective digital security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft\u2019s security team has issued an advisory on the rising threat of OAuth attacks, which exploit compromised user accounts to perform illicit activities such as crypto mining and spamming. The company advises organizations to strengthen their identity infrastructure and access policies to prevent such breaches. OAuth allows users to grant permissions to third-party applications without [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":66880,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[777,2227,17568],"class_list":["post-66878","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-crypto-mining","tag-microsoft","tag-oauth-attacks"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/12\/Microsoft-crypto.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/66878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=66878"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/66878\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/66880"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=66878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=66878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=66878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}