Defending Against New Phishing Attacks that Abuse OAuth Authorization Flows


Posted on in Presentations

Users are prompted to login at the real Microsoft login page, real domain, real cert, and also have MFA enabled. But they've just been phished by a new attack that abuses the OAuth authorization protocol. The attacker is not stopped by the MFA controls and has full access to all of the Microsoft data including Office and Azure. This session will show how to detect and mitigate these phishing attacks.


Participants
Jenko Hwong

Speaker

Principal Security Researcher, Netskope


Share With Your Community