Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets

Cloud account takeover attacks have evolved beyond simple credential theft. Cybercriminals are now exploiting OAuth applications to maintain persistent access to compromised environments, bypassing traditional security measures like password resets and multifactor authentication.

Cloud account takeover (ATO) attacks have become a significant concern in recent years, with cybercriminals and state-sponsored actors increasingly adopting malicious OAuth applications as a means to gain persistent access within compromised environments.

These attacks allow malicious actors to hijack user accounts, conduct reconnaissance, exfiltrate data, and launch further malicious activities.

Proofpoint researchers have demonstrated how these attacks can be fully automated, and threat actors are already actively exploiting these vulnerabilities in the wild.

The security implications are particularly concerning. Once an attacker gains access to a cloud account, they can create and authorize internal (second-party) applications with custom-defined scopes and permissions.

This capability enables persistent access to critical resources such as mailboxes and files, effectively circumventing traditional security measures like password changes.

To better understand and demonstrate this attack vector, Proofpoint researchers have developed a tool that automates the creation of malicious internal applications within a compromised cloud environment.

This provides an in-depth technical analysis of that tool and its implications for enterprise security. Additionally, real-world incidents detected through telemetry offer concrete evidence of how threat actors are actively exploiting such vulnerabilities in the wild.

Understanding OAuth Application Types

In the context of cloud environments, particularly Microsoft Entra ID, it’s crucial to understand the distinction between second-party and third-party applications.

Second-party applications are registered directly within an organization’s tenant. Also known as internal applications, they are generally created and managed by the organization’s administrators or users with appropriate privileges.

Second-party applications inherit a level of implicit trust within the environment, as they originate from within the organization’s own directory.

Third-party applications are registered in external tenants and request access to resources in other organizations’ tenants. Common examples include widely-used services like Zoom or DocuSign.

Application creation process. In the example the app name is 'justSOMEniceAPP'.Application creation process. In the example the app name is 'justSOMEniceAPP'.
Application creation process. In the example the app name is ‘justSOMEniceAPP’. 

Third-party applications typically undergo additional scrutiny through administrative consent workflows and organizational security policies before being granted access.

This distinction is particularly relevant from a security perspective, as threat actors often prefer creating second-party applications during post-exploitation phases.

These internal applications can be more difficult to detect and may bypass security controls designed primarily for external application monitoring.

How Attackers Establish Persistent Access

Cybercriminals often leverage a combination of techniques to gain initial access to cloud user accounts. One common tactic is the use of reverse proxy toolkits accompanied by individualized phishing lures that enable the theft of credentials and session cookies.

Once the attackers have stolen a user’s login credentials, they can establish unauthorized access to the targeted accounts, setting the stage for the next phases of the attack.

This visibility in standard administrative interfaces underscores the importance of regular application auditing and monitoring, as malicious applications may blend in with legitimate business applications unless specifically scrutinized. 

Location of application secrets in Microsoft Azure.Location of application secrets in Microsoft Azure.
Location of application secrets in Microsoft Azure.

Following successful initial access, attackers often pivot to creation and deployment of malicious OAuth applications. This process typically involves leveraging the compromised account’s privileges to register new internal applications, configuring specific permissions and API scopes for maximum impact, and authorizing these applications to access critical organizational resources.

The strategic value of this approach lies in its persistence mechanism: even if the compromised user’s credentials are reset or multifactor authentication is enforced, the malicious OAuth applications maintain their authorized access.

This creates a resilient backdoor that can remain undetected within the environment indefinitely, unless specifically identified and remediated.

Proofpoint researchers have developed an automated toolkit which demonstrates methods by which threat actors establish persistent access through malicious OAuth applications.

The proof-of-concept implements several key capabilities that mirror real-world attack scenarios, including automated OAuth application registration and configuration, customizable permission scope selection, persistent access mechanism independent of user credentials, and configurable application naming conventions.

Starting from an initially compromised account, the tool streamlines the post-exploitation process through automated application creation.

While this demonstration uses randomized application names, real-world threat actors typically employ deceptive naming strategies that mimic legitimate business applications to avoid detection.

During the automated deployment process, an application is registered with pre-configured permission scopes that align with the attacker’s objectives.

A critical aspect of this implementation is the ownership attribution: the compromised user account becomes the registered owner of the newly created application, effectively establishing it as a legitimate internal resource within the organization’s environment.

This ownership model provides several tactical advantages. The application appears as an internally developed resource and the authentication requests originate from within the organization’s tenant.

The application inherits trust relationships associated with internal resources, and standard third-party application security controls may not detect or flag this activity.

Upon successful application registration, the tool automatically establishes two critical authentication components: application secret generation and token harvest.

The tool first creates a cryptographic client secret for the application, which serves as the application’s own authentication credential. The automation then proceeds to collect multiple OAuth token types, including an access token, a refresh token, and an ID token.

Following the password reset, the tool demonstrates the sustained effectiveness of the malicious application’s access through several key activities.

It successfully retrieves user mailbox contents and maintains continuous access to incoming and historical emails, now operating independently of user credential changes.

User emails accessed even after password change. User emails accessed even after password change.
User emails accessed even after password change. 

The scope of unauthorized access extends well beyond email, encompassing SharePoint documents, OneDrive stored files, Teams messages, calendar information, organizational contacts, and other Microsoft 365 resources.

Real-World Attack Observed in the Wild

Proofpoint telemetry revealed a real-world account takeover incident that persisted for four days. The initial compromise was detected through a successful login attempt using a user agent signature most likely associated with Adversary-in-the-Middle (AiTM) phishing attacks, specifically the Tycoon phishing kit.

Demonstration of user password change. Demonstration of user password change.
Demonstration of user password change. 

The threat actor, operating through US-based VPN proxies, executed several malicious actions: created malicious mailbox rules, registered an internal application named ‘test’, and added application secrets with Mail.Read and offline_access permissions, enabling persistent access to the victim’s mailbox even after password changes.

After approximately four days, the user’s password was changed, following which failed login attempts were observed from a Nigerian residential IP address, suggesting the threat actor’s possible origin. However, the application remained active.

This case study serves as a concrete example demonstrating that these threats are not merely theoretical, but active, exploited risks in the current threat landscape.

Follow us on Google NewsLinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

Source link

Visited 1 times, 1 visit(s) today

Related Article

Slate May Be About To Price Itself Out Of The EV Market

It seems the Slate Truck could have a hard time competing with the Ford Maverick by Brad Anderson 2 hours ago Slate Auto’s electric truck may lease for over $500 per month. Removal of EV tax credits has pushed the truck’s price higher. Competitors like Ford’s Maverick may offer cheaper leases. The big selling point

Viasat demonstrates first satellite SMS messages on Android smartphone in Mexico

Viasat has completed an in-country first-of-its-kind direct-to-device (D2D) demonstration in Mexico – featuring native SMS messages on the Android smartphone. The demonstration showcased smartphones sending and receiving messages over Viasat’s I-4 F3 satellite using 3GPP Non-Terrestrial Network (NTN) standards. In a country-first, native SMS messages were shared across two mass market Android smartphones, with one

Oura launches redesigned app and ‘Cumulative Stress’ feature

Oura announced on Monday that it’s launching a new redesigned app experience and a “Cumulative Stress” feature. The company also shared that it’s pursuing FDA clearance for blood pressure features that give users a likelihood assessment of hypertension. The redesigned Oura app introduces more personalization with three main tabs. The “Today” tab surfaces the most

Future Scope of EV Swappable Battery Systems Market Set

EV Swappable Battery Systems Market The worldwide “EV Swappable Battery Systems Market” 2025 Research Report presents a professional and complete analysis of the Global EV Swappable Battery Systems Market in the current situation. This report includes development plans and policies along with EV Swappable Battery Systems manufacturing processes and price structures. The reports 2025 research

Full list of websites and apps affected as outage wipes out ‘half the internet’

Users around the world have been left frantically refreshing apps on their phone this morning (20 October), and it’s all part of an internet outage. If you’ve been wondering why messages haven’t been sending, or why that 9am team video call catch-up isn’t loading you in as it should, you’re not alone. A number of

Apple TV, Apple Music and App Store are down as Apple services suffer major outage

Update: The Apple system status now says Apple TV, Apple Music and App Store issues are now resolved. Apple online services are currently experience a big outage that has lasted a couple hours already. Some customers are noticing they are unable to stream on Apple TV, listen to their library on Apple Music, or download

India Electric Vehicle Market Outlook and Future Growth Trends:

India Electric Vehicle Market India Electric Vehicle Market size was valued at US$ 30.35 Bn. in 2023 and the total revenue is expected to grow at 24.31% from 2024 to 2030, reaching US$ 139.22 Bn. India Electric Vehicle Market Overview: The India Electric Vehicle (EV) Market is experiencing significant growth as the country moves toward

Drowning in stress? You’re not alone – and this app could be your lifeline

I wonder if you would describe yourself as stressed. Money is tight, and the bills are piling up. Family members are ill. The boiler has failed again, and the temperature is dropping fast. The children argue like it’s an Olympic sport. These are common problems that affect all of us, and oftentimes they can leave