Hackers are exploiting OAuth loophole for persistent access – and resetting your password won’t save you



  • Researchers have observed attackers weaponizing OAuth apps
  • Attackers gain access that persists even through password changes and MFA
  • This isn’t just a proof of concept – it’s been observed in the wild

Researchers at Proofpoint have discovered a tactic used by threat actors to weaponize OAuth applications in order to gain persistent access within compromised environments – where hackers can retain access even after MFA or a password reset is carried out.

This attack has the potential to be devastating, as an attacker with access to a cloud account could open the door for a series of other intrusions. This account access could then be used to create and authorize internal applications with custom permissions – allowing the access to files, communications, and sidestepping security.

https://cdn.mos.cms.futurecdn.net/h3qR8UKMq6wXR6WHZfxfUe-900-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img