Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Attack Types

OAuth Phishing

An attack that tricks users into granting a malicious application OAuth consent, giving attackers persistent account access without requiring the user's password.

Definition

OAuth phishing, also known as consent phishing or illicit consent grant attack, exploits the OAuth 2.0 authorization framework. Instead of stealing a password, the attacker registers a malicious third-party application and directs the victim to a legitimate OAuth consent screen — often hosted on microsoft.com or accounts.google.com — asking them to grant permissions such as reading email, accessing contacts, or managing files. If the victim consents, the attacker receives a persistent OAuth token granting access to the victim's account.

Why It Matters

OAuth tokens are independent of the user's password and survive password resets, making this a preferred persistence mechanism in BEC and corporate espionage attacks. Because the consent prompt is served from a legitimate identity provider domain, it bypasses many phishing detection controls. Revocation requires explicit audit of authorized applications — an operational step most organizations lack the tooling or process to perform routinely. In Microsoft 365 environments, illicit consent grants have been used to exfiltrate email, calendar data, and SharePoint files for months after initial compromise.

How It Works

The attacker registers an application in a cloud identity platform (Azure AD, Google Cloud) and crafts a phishing email with a link that initiates an OAuth authorization request. The link specifies the desired permission scopes — which may be broad (Mail.ReadWrite, Files.ReadWrite.All) or narrow to avoid raising suspicion. The victim authenticates to their real identity provider and is shown a consent prompt that appears to come from a legitimate service. Once consent is granted, the attacker's application receives an access token and, if offline_access was requested, a refresh token enabling long-term access. The malicious app remains authorized until explicitly revoked.

DFIR Platform

BEC Investigation

The DFIR Lab BEC Investigation API includes an OAuth app audit endpoint that enumerates authorized third-party application consents for a tenant and flags applications exhibiting indicators of compromise — excessive permission scopes, recently registered publishers, and apps not present in the organization's approved baseline. Because OAuth tokens persist through password resets, this audit is a critical step in any BEC investigation

View Documentation

Related Concepts

Business Email Compromise (BEC)Credential HarvestingSpear Phishing

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free