OAuth Phishing
An attack that tricks users into granting a malicious application OAuth consent, giving attackers persistent account access without requiring the user's password.
Definition
OAuth phishing, also known as consent phishing or illicit consent grant attack, exploits the OAuth 2.0 authorization framework. Instead of stealing a password, the attacker registers a malicious third-party application and directs the victim to a legitimate OAuth consent screen — often hosted on microsoft.com or accounts.google.com — asking them to grant permissions such as reading email, accessing contacts, or managing files. If the victim consents, the attacker receives a persistent OAuth token granting access to the victim's account.
Why It Matters
OAuth tokens are independent of the user's password and survive password resets, making this a preferred persistence mechanism in BEC and corporate espionage attacks. Because the consent prompt is served from a legitimate identity provider domain, it bypasses many phishing detection controls. Revocation requires explicit audit of authorized applications — an operational step most organizations lack the tooling or process to perform routinely. In Microsoft 365 environments, illicit consent grants have been used to exfiltrate email, calendar data, and SharePoint files for months after initial compromise.
How It Works
The attacker registers an application in a cloud identity platform (Azure AD, Google Cloud) and crafts a phishing email with a link that initiates an OAuth authorization request. The link specifies the desired permission scopes — which may be broad (Mail.ReadWrite, Files.ReadWrite.All) or narrow to avoid raising suspicion. The victim authenticates to their real identity provider and is shown a consent prompt that appears to come from a legitimate service. Once consent is granted, the attacker's application receives an access token and, if offline_access was requested, a refresh token enabling long-term access. The malicious app remains authorized until explicitly revoked.
DFIR Platform
BEC Investigation
The DFIR Lab BEC Investigation API includes an OAuth app audit endpoint that enumerates authorized third-party application consents for a tenant and flags applications exhibiting indicators of compromise — excessive permission scopes, recently registered publishers, and apps not present in the organization's approved baseline. Because OAuth tokens persist through password resets, this audit is a critical step in any BEC investigation
View DocumentationRelated Concepts
Try these concepts in practice
Free tier with 100 credits/month. No credit card needed.