Experts Warn Microsoft Copilot Studio Agents Are Being Hijacked To Steal OAuth Tokens


  • CoPhish uses Copilot Studio agents to phish OAuth tokens via fake login flows
  • Attackers exploit Microsoft domains to appear legitimate and gain access to sensitive user data
  • Remediation includes limiting app consent, enforcing MFA, and monitoring OAuth activity

Security researchers from Datadog Security Labs are warning of a new phishing technique that weaponizes Microsoft Copilot Studio agents to steal OAuth tokens and gives attackers access to sensitive information in emails, chats, calendars and more.

The technique is called CoPhish, and while Microsoft confirmed it is a social engineering technique, it acknowledged it and said it will work to fix it.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top