New Vulnerability Exploit Targets Microsoft Azure via Automated OAuth Abuse
Microsoft Azure Under Fire: ConsentFix v3 Attacks Automate OAuth Abuse
Microsoft Azure has fallen prey to a new wave of attacks that exploit an automated OAuth abuse technique known as ConsentFix v3.
The Consistent Nature of ConsentFix v3 Attacks
ConsentFix v3 involves several stages:
-
Reconnaissance: Identifying potential targets within the Azure environment.
-
Gathering Employee Details: Collecting names, roles, and addresses to aid in impersonation and phishing attempts.
-
Creating Multiple Accounts: Setting up accounts on various services like Outlook, Tutanota, and Cloudflare to facilitate phishing, hosting, and data collection operations.
-
Pipedream Utilization: Employing a free-to-use serverless integration platform as a webhook endpoint, automation engine, and central collector.
-
Oauth Authorization Code Exchange: Redirecting victims to a localhost URL containing an OAuth authorization code, which is then exchanged for tokens.
-
Specter Portal Interaction: Importing tokens into the Specter Portal, enabling attackers to interact with compromised Microsoft environments and access allowed resources.
Mitigation Strategies
To counter ConsentFix attacks, administrators should consider implementing the following strategies:
-
Token Binding: Applying token binding to trusted devices.
-
Behavioral Detection Rules: Setting up behavioral detection rules.
-
App Authentication Restrictions: Applying app authentication restrictions.
The success of ConsentFix attacks relies heavily on the architectural trust placed in first-party apps, making mitigation challenging.
While it remains unclear whether the v3 variant has gained significant traction among cybercriminals, the emergence of ConsentFix v3 emphasizes the need for continued vigilance in protecting against sophisticated attacks.
