Hackers Are Exploiting OAuth Loophole to Gain Persistent Access, and Resetting Your Password Won’t Save You



  • Researchers have observed that attackers use OAuth applications as weapons
  • Attackers gain access that persists even across password and MFA changes
  • This is not just a proof of concept: it has been observed in nature.

Proofpoint researchers have discovered a tactic used by threat actors to weaponize OAuth applications to gain persistent access within compromised environments, where hackers can retain access even after MFA or a password reset is performed.

This attack has the potential to be devastating, as an attacker with access to a cloud account could open the door to a series of other intrusions. This account access could be used to create and authorize internal applications with custom permissions, allowing access to files, communications, and bypassing security.

Leave a Comment

Your email address will not be published. Required fields are marked *