Experts warn that Microsoft Copilot Studio agents are being hijacked to steal OAuth tokens



  • CoPhish uses Copilot Studio agents to spoof OAuth tokens using fake login flows
  • Attackers exploit Microsoft domains to appear legitimate and access sensitive user data.
  • Mitigations include restricting app consent, enforcing MFA, and monitoring OAuth activity.

Security researchers at Datadog Security Labs are warning of a new phishing technique that weaponizes Microsoft Copilot Studio agents to steal OAuth tokens and gives attackers access to sensitive information in emails, chats, calendars, and more.

The technique is called CoPhish, and although Microsoft confirmed that it is a social engineering technique, it acknowledged it and said it will work to fix it.



Leave a Comment

Your email address will not be published. Required fields are marked *