Hackers are exploiting OAuth loophole for persistent access – and resetting your password won’t save you

Hackers are exploiting OAuth loophole for persistent access – and resetting your password won’t save you



  • Researchers have observed attackers weaponizing OAuth apps
  • Attackers gain access that persists even through password changes and MFA
  • This isn’t just a proof of concept – it’s been observed in the wild

Researchers at Proofpoint have discovered a tactic used by threat actors to weaponize OAuth applications in order to gain persistent access within compromised environments – where hackers can retain access even after MFA or a password reset is carried out.

This attack has the potential to be devastating, as an attacker with access to a cloud account could open the door for a series of other intrusions. This account access could then be used to create and authorize internal applications with custom permissions – allowing the access to files, communications, and sidestepping security.



Source: Techradar

Leave a Reply

Your email address will not be published. Required fields are marked *