Multi-factor authentication systems tricked in new cyber scam

(Image credit: wk1003mike / Shutterstock)

Security researchers have uncovered a new phishing campaign capable of bypassing multi-factor authentication (MFA) in Office 365 to access user data stored in the cloud.

The discovery was made by the Cofense Phishing Defense Center and the new phishing technique, which leverages the Oauth2 framework and the OpenID Connect (OIDC) protocol, uses a malicious SharePoint link in order to trick users into granting permissions to a rogue application.

However, this campaign is quite different from a typical credential harvester due to how it tries to trick users into granting permissions to the attacker's application that is capable of bypassing MFA.

In a blog post, Cofense researcher Elmer Hernandez explained how the phishing campaign leverages users themselves to access their data, saying:

“The OAuth2 phish is a relevant example of adversary adaptation. Not only is there no need to compromise credentials, but touted security measures such as MFA are also bypassed; it is users themselves who unwittingly approve malicious access to their data.”

Oauth2 phish

The attackers try to lure victims into opening their phishing email, which mimics a normal invite to a SharePoint hosted file, with the promise of a Q1 bonus.

After clicking on the link, users are taken to what appears to be the the legitimate Microsoft Office 365 login page. However, after carefully inspecting the long-form URL, Cofense researchers found clues to its real intentions. Unlike security researchers, average users rarely take the time to inspect URLs and most people wouldn't think twice about how the URL of the web page used by the attackers is actually much longer than it should be.

Additional parameters in the fake URL show how the attacker can trick a victim into giving their rogue application permissions to their account. For instance, the redirect uri parameter actually sends responses to a domain located in Sofia, Bulgaria and hosted by BelCloud.

If a user falls for this phishing scheme, an attacker could gain access to all of their emails and cloud hosted documents. With this information in hand, the attacker could then use it to extort victims for a Bitcoin ransom or use their contact list to find other potentially susceptible targets. 

Cybercriminals are constantly developing new techniques to bypass security solutions and this new phishing campaign is not only clever but also quite dangerous. To avoid falling victim to this and other phishing attacks, it is highly recommended that users exercise caution when opening emails or clicking on links sent from unknown sources. Also if an email's subject seems too good to be true, it probably is.

Via ThreatPost

Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)