Hackers are exploiting OAuth loophole for persistent access – and resetting your password won’t save you

  • Researchers have observed attackers weaponizing OAuth apps
  • Attackers gain access that persists even through password changes and MFA
  • This isn’t just a proof of concept – it’s been observed in the wild

Researchers at Proofpoint have discovered a tactic used by threat actors to weaponize OAuth applications in order to gain persistent access within compromised environments – where hackers can retain access even after MFA or a password reset is carried out.

This attack has the potential to be devastating, as an attacker with access to a cloud account could open the door for a series of other intrusions. This account access could then be used to create and authorize internal applications with custom permissions – allowing the access to files, communications, and sidestepping security.

Cybercriminals have increasingly used cloud account takeover (ATO) tactics in recent years – as it allows them to hijack accounts, exfiltrate information, and use this as a foothold for other attacks. Both frequency and severity has increased, with strategies fast evolving.

Persistent access

The researchers have developed a proof of concept to outline how this attack might look in the wild, building a tool that automates the creation of malicious internal applications within the breached cloud environment.

A real-world example was also discovered when experts detected a successful login attempt, which, based on threat intelligence, is likely to be associated with ‘Adversary-in-the-middle’ social engineering attacks.

“After approximately 4 days the user’s password was changed, following which we observed failed login attempts from a Nigerian residential IP address, suggesting the threat actor’s possible origin,” the researchers explain.

“However, the application remained active. This case study serves as a concrete example of the attack patterns discussed in our blog, demonstrating that these threats are not merely theoretical – but active, exploited risks in the current threat landscape.”

The only way to revoke access in these cases before the expiration of the secret credentials (which remain valid for two years) is by manually removing permissions, so make sure to consistently review and account permissions regularly and continuously monitor applications.

Read more @ TechRadar

Latest posts

Scientists engineer erbium molecular qubits that plug directly into existing fiber networks, promising telecom-ready quantum systems

Erbium molecular qubits provide precise optical and spin transitions for quantum controlThese qubits enable spin states to be accessed through telecom-compatible lightHigh-resolution spin-photon interfaces...

The AI race explodes as HPE deploys AMD’s Helios racks, crushing limits with Venice CPUs and insane GPU density

HPE will ship 72-GPU racks with next-generation AMD Instinct accelerators globallyVenice CPUs paired with GPUs target exascale-level AI performance per rackHelios relies on liquid...

Game in style with almost 50% off this 31.5-inch MSI Curved Gaming Monitor

Feeling the Black Friday blues? If you missed our Black Friday gaming monitor deals, you can still get this MSI Optix G32C4W Curved Gaming...

This tiny white tower packs an RTX 5060 GPU and a Ryzen 9 8945HX CPU, but looks nothing like a mini PC

Minisforum AtomMan G1 Pro packs a desktop-grade GPU into a chassis that struggles with thermal headroomFour 4K displays push signal routing and thermal stability...

Bending Spoons continues its spree of buying famous tech brands with the Eventbrite deal

Bending Spoons acquires Eventbrite for $500 million to revive its operationsThe purchase price reflects a steep drop from Eventbrite’s 2018 IPOEventbrite stockholders receive $4.50...

Looking to supercharge your Raspberry Pi? This adapter provides two full-sized HDMI ports and a PCIe connector – and it only costs $10

Raspberry Pi 5 PCIe to M.2 multifunction adapter delivers dual HDMI accessThe compact board supports PCIe storage expansion via the small M.2 slotUsers can...

Over 70 US banks and credit unions affected by Marquis ransomware breach – here’s what we know

Marquis Software Solutions hit by ransomware via SonicWall flaw, affecting 400,000+ customers across 74 banks/credit unionsStolen data includes names, SSNs, TINs, financial info, and...

Warhammer 40,000: Dawn of War 4 gets a new story trailer teasing the playable Dark Angels faction ahead of its 2026 launch

A new story trailer for Warhammer 40,000: Dawn of War 4 has been releasedThe trailer teases The Dark Angels, which is one of two...

Newly-discovered $1.5 billion lithium deposit could revolutionize the tech industry – but bad news, it’s inside a supervolcano

Nevada-Oregon caldera hosts lithium clay estimated at 20-40 million tonsLithium discovery could reach $1.5 trillion at current market pricesQuadruple-layered sediment and hydrothermal activity enriched...

The godfather speaks – this is the device Linus Torvalds says would be his perfect Linux PC, but you’ll never get one

Linus Torvalds' perfect Linux PC includes an Intel Arc 8580 GPUThe build features ECC memory to ensure data accuracy for development tasksThreadripper gives Torvalds...