Security

Entra ID OAuth Redirect Abuse Fuels Phishing Attacks

3 min read

Summary

Microsoft says attackers are abusing a normal Microsoft Entra ID OAuth redirect behavior to turn trusted login links into phishing or malware delivery paths, often by forcing an OAuth error and sending victims to attacker-controlled redirect URIs. The campaign matters because it can bypass user suspicion and some security filters without stealing tokens, and it has been observed targeting government and public-sector organizations.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Introduction: why this matters

OAuth links to well-known identity providers (IdPs) like Microsoft Entra ID are often trusted by users and, in some cases, treated more leniently by security controls. Microsoft’s latest research highlights a “by design” OAuth redirection behavior being abused to send users from legitimate login domains to attacker infrastructure—enabling phishing and malware delivery while looking like a normal sign-in flow.

This is particularly relevant for IT admins in government and public-sector organizations, which were specifically targeted in the observed activity.

What’s new / key findings

Microsoft Defender Security Research Team observed phishing-led exploitation of OAuth redirection mechanics across email, identity, and endpoint signals:

  • Abuse of silent OAuth flows: Attackers craft OAuth authorization URLs using parameters like prompt=none to attempt a silent authentication check (no UI).
  • Intentionally invalid scopes to force an error path: Requests include scope=<invalid_scope> (or other failure triggers) to reliably generate an OAuth error.
  • Error-driven redirect to attacker-controlled URI: When the IdP returns an error (for example, interaction_required), the browser is redirected to the app’s registered redirect URI, which the attacker configures to point to phishing pages or malware download sites.
  • No token theft required for the redirect: The attacker is not necessarily trying to complete OAuth successfully; the redirect is the main goal.
  • State parameter misuse for personalization: The state parameter—meant for request/response correlation—was repurposed to pass the victim’s email address (plaintext, hex, Base64, or custom encoding) so phishing pages can auto-populate identifiers.
  • Campaign delivery patterns: Phishing lures included e-signature requests, financial/social security themes, document sharing, Teams/meeting content, and password reset prompts. Some used PDF attachments with embedded links and even .ics calendar invites.
  • Downstream tooling: Post-redirect pages frequently used phishing frameworks like EvilProxy (attacker-in-the-middle) designed to capture credentials and session cookies, sometimes adding CAPTCHA/interstitial steps.

Impact on IT administrators and end users

  • Higher click-through risk: Links begin on trusted IdP domains (for example, login.microsoftonline.com), increasing user confidence.
  • Defense bypass pressure: Traditional URL reputation checks may focus on the initial domain and miss the eventual destination.
  • Visibility needs across layers: Microsoft notes Defender correlated signals across email, identity, and endpoint, emphasizing that single-control detection may be insufficient.
  • Ongoing threat: Microsoft Entra disabled observed malicious OAuth applications, but related activity persists—monitoring is still required.

Action items / next steps

  1. Hunt for suspicious OAuth authorize patterns in logs and proxy telemetry, especially:
    • prompt=none combined with unusual/invalid scope values
    • Frequent OAuth failures followed by redirects to non-corporate domains
    • Use of /common/ in unexpected high-volume phishing contexts
  2. Review and restrict app consent and app registrations:
    • Audit newly created apps and redirect URIs for untrusted domains
    • Tighten who can register applications/modify redirect URIs in Entra ID
  3. Strengthen phishing protections beyond “trusted domain” checks:
    • Ensure URL detonation/safe-link tooling follows redirects
    • Educate users that “starts at Microsoft sign-in” does not guarantee safety
  4. Validate Conditional Access and session controls:
    • Monitor sign-in and OAuth error telemetry for anomalies and targeted user groups
  5. Use Defender correlation:
    • Leverage Microsoft Defender for Office 365 + Defender for Identity/Endpoint to correlate email lure, sign-in behavior, and endpoint payload activity.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

OAuthMicrosoft Entra IDphishingMicrosoft Defenderidentity security

Related Posts

Security

Dirty Frag Linux Vulnerability Raises Root Risk

Microsoft has warned of active exploitation involving the newly disclosed Dirty Frag Linux local privilege escalation vulnerability, which can help attackers move from a low-privileged account to root. The issue affects kernel networking components such as esp4, esp6, and rxrpc, making it especially important for administrators to review module exposure, restrict local access, and prepare for vendor kernel patches.

Security

AI Agent RCE Flaws in Semantic Kernel Explained

Microsoft Defender researchers disclosed two fixed vulnerabilities in Semantic Kernel that could let prompt injection escalate into host-level remote code execution in AI agents. The findings matter because they show how unsafe tool parameter handling in agent frameworks can turn natural language inputs into code execution paths, raising the stakes for organizations building or securing AI-powered apps.

Security

Microsoft Entra Passkeys: 2026 Passwordless Updates

Microsoft outlined major passkey and account recovery updates across Entra ID, Windows, External ID, and Microsoft Password Manager as part of World Passkey Day. The changes matter for IT teams because they expand phishing-resistant sign-in options, improve recovery security, and continue the retirement of weaker authentication methods such as security questions.

Security

Microsoft AI SOC Report 2026: KuppingerCole Leader

Microsoft says it has been named an Overall Leader and Market Leader in KuppingerCole Analysts’ 2026 Emerging AI Security Operations Center report. The announcement highlights Microsoft’s push beyond traditional SOAR toward AI-driven, agent-assisted security operations in Sentinel and Security Copilot to help SOC teams improve speed, consistency, and scale.

Security

ClickFix macOS Campaign Delivers Infostealers

Microsoft has identified a new ClickFix-style campaign targeting macOS users with fake troubleshooting and utility instructions hosted on blogs and content platforms. Instead of downloading apps, victims are tricked into running Terminal commands that bypass typical macOS app checks and deploy infostealers such as Macsync, SHub Stealer, and AMOS.

Security

AiTM Phishing Campaign Targets Microsoft 365 Users

Microsoft has detailed a large-scale adversary-in-the-middle (AiTM) phishing campaign that used fake code-of-conduct investigations to steal authentication tokens. The attack combined polished social engineering, staged CAPTCHA pages, and a legitimate Microsoft sign-in flow, highlighting why phishing-resistant protections and stronger email defenses matter.