Hackers exploit OAuth loopholes for persistent access – and resetting your password won’t save you


  • Researchers have observed attackers weaponizing OAuth apps
  • Attackers gain access that persists even through password changes and MFA
  • This is not just a proof of concept – it has been observed in nature

Researchers at Proofpoint have discovered a tactic used by threat actors to weaponize OAuth applications to gain persistent access in compromised environments – where hackers can maintain access even after MFA or a password reset is performed.

This attack has the potential to be devastating, as an attacker with access to a cloud account can open the door to a number of other intrusions. This account access could then be used to create and authorize internal applications with customized permissions – allowing access to files, communications and bypassing security.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top