×

Threat Actors Impersonate Microsoft OAuth Apps to Steal Login Credentials

Threat actors are leveraging sophisticated phishing campaigns by creating fake Microsoft OAuth applications to impersonate legitimate enterprises, enabling credential theft while bypassing multifactor authentication (MFA).

Proofpoint researchers have tracked this activity since early 2025, identifying over 50 impersonated applications, including those mimicking RingCentral, SharePoint, Adobe, and DocuSign.

These malicious OAuth apps serve as initial lures, redirecting users to attacker-in-the-middle (AiTM) phishing kits like Tycoon and ODx, which capture credentials and session cookies in real time.

Login Credentials
Landing page for requested permissions from malicious OAuth app.  

The campaigns exploit OAuth consent flows, requesting benign scopes such as viewing basic profiles or maintaining data access, but regardless of user consent, victims are funneled to counterfeit Microsoft login pages branded with their organization’s Entra ID details.

This AiTM approach proxies authentication requests, intercepting MFA tokens and enabling account takeovers (ATOs) for purposes like information gathering, lateral movement, or further phishing from compromised accounts.

Campaign Overview and Techniques

Proofpoint has reported these apps to Microsoft, and upcoming changes in Microsoft 365 such as blocking legacy authentication and requiring admin consent for third-party apps starting mid-July 2025 are expected to disrupt this tactic significantly.

Emails in these campaigns often originate from compromised accounts, using lures themed around requests for quotes or business contracts, targeting thousands of messages across hundreds of organizations.

Customization occurs based on industry, with impersonations tailored to specific software, amplifying relevance and success rates.

In cloud tenant data, Proofpoint observed over two dozen similar malicious apps, primarily requesting scopes like openid, email, and profile, with reply URLs leading to phishing infrastructure.

While most apps acted as lures without direct compromise capabilities, ATOs were confirmed in only five cases, indicating a low but targeted success rate exceeding 50% in broader Tycoon-linked operations affecting nearly 3,000 accounts across 900 environments in 2025.

Infrastructure Insights

A March 2025 campaign targeted a U.S.-based aviation firm, impersonating ILSMart an aerospace inventory service with OAuth app “iLSMART” requesting basic profile access and data maintenance permissions.

Redirects led to CAPTCHA challenges and Tycoon-powered fake Microsoft pages that harvested credentials and MFA tokens via synchronous relays.

Configuration details included reply URLs like azureapplicationregistration[.]pages[.]dev/redirectapp and scopes focused on user profile visibility.

Similarly, a June 2025 Adobe impersonation used SendGrid-delivered emails redirecting through intermediate URLs to an OAuth “Redirector App,” ultimately landing on Tycoon phishing pages with parameters like client_id 854189f9-4c71-44bb-9880-dd0c2f75922a and scopes including openid+email+profile.

Login Credentials
“Redirector app” landing page. 

Cloud impacts revealed clusters like a fake “Adobe” app affecting four users via reply URL workspacesteamworkspace[.]myclickfunnels[.]com/offices–af295, with Axios user agents (e.g., axios/1.7.9) signaling Tycoon involvement.

Another incident with “OneDrive-2025” used cleansbeauty[.]com/lost/apc.html, followed by MFA manipulations like adding security methods for persistence.

Example phishing flow or application consent prompt for impersonated Adobe app. 

Tycoon, a phishing-as-a-service platform, employs Axios HTTP clients for exploitation, shifting infrastructure in April 2025 from Russian proxies to U.S.-based data center hosting to evade detection.

Proofpoint notes this as part of a broader trend toward identity-targeted AiTM attacks, recommending defenses like email security for BEC prevention, cloud monitoring for ATO detection, web isolation, user awareness, and FIDO keys.

Indicators of Compromise

Indicator Description First Seen
hxxps[:]//azureapplicationregistration[.]pages[.]dev/redirectapp Redirector to Tycoon 18 March 2025
yrqwvevbjcfv[.]es Tycoon Landing Domain 18 March 2025
gmlygt[.]ru Tycoon Antibot (Example) 18 March 2025
2a00:b703:fff2:35::1 Example of Signin Facing IP for Tycoon 18 March 2025
hxxps://chikeukohandco[.]com/saas/Index.html Redirector to Tycoon 12 June 2025
pw5[.]haykovx[.]es Tycoon Landing Domain 12 June 2025
14b2864e-3cff-4d33-b5cd-7f14ca272ea4 Malicious Microsoft OAuth Application ID 27 January 2025
85da47ec-2977-40ab-af03-f3d45aaab169 Malicious Microsoft OAuth Application ID 04 February 2025
355d1228-1537-4e90-80a6-dae111bb4d70 Malicious Microsoft OAuth Application ID 19 February 2025
6628b5b8-55af-42b4-9797-5cd5c148313c Malicious Microsoft OAuth Application ID 19 February 2025
b0d8ea55-bc29-436c-9f8b-f8829030261d Malicious Microsoft OAuth Application ID 04 March 2025
22c606e8-7d68-4a09-89d9-c3c563a453a0 Malicious Microsoft OAuth Application ID 11 March 2025
31c6b531-dd95-4361-93df-f5a9c906da39 Malicious Microsoft OAuth Application ID 11 March 2025
055399fa-29b9-46ab-994d-4ae06f40bada Malicious Microsoft OAuth Application ID 18 February 2025
6a77659d-dd6f-4c73-a555-aed25926a05f Malicious Microsoft OAuth Application ID 06 March 2025
21f81c9e-475d-4c26-9308-1de74a286f73 Malicious Microsoft OAuth Application ID 20 February 2025
987c259f-da29-4575-8072-96c610204830 Malicious Microsoft OAuth Application ID 18 March 2025
db2eb385-c02f-44fc-b204-ade7d9f418b1 Malicious Microsoft OAuth Application ID 10 March 2025
f99a0806-7650-4d78-acef-71e445dfc844 Malicious Microsoft OAuth Application ID 17 March 2025
fdcf7337-92bf-4c70-9888-ea234b6ffb0d Malicious Microsoft OAuth Application ID 27 February 2025
fe0e32ca-d09e-4f80-af3c-5b086d4b8e66 Malicious Microsoft OAuth Application ID 06 March 2025
axios/1.7.9 Axios user agent associated with Tycoon activity 09 December 2024
axios/1.8.2 Axios user agent associated with Tycoon activity 10 March 2025

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!

Post Comment