More

    Hackers are exploiting OAuth loophole for persistent access – and resetting your password won’t save you



    • Researchers have observed attackers weaponizing OAuth apps
    • Attackers gain access that persists even through password changes and MFA
    • This isn’t just a proof of concept – it’s been observed in the wild

    Researchers at Proofpoint have discovered a tactic used by threat actors to weaponize OAuth applications in order to gain persistent access within compromised environments – where hackers can retain access even after MFA or a password reset is carried out.

    This attack has the potential to be devastating, as an attacker with access to a cloud account could open the door for a series of other intrusions. This account access could then be used to create and authorize internal applications with custom permissions – allowing the access to files, communications, and sidestepping security.

    https://cdn.mos.cms.futurecdn.net/h3qR8UKMq6wXR6WHZfxfUe-900-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img