Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

Meta reportedly in talks to invest billions of dollars in Scale AI

June 8, 2025

Debra Messing Honored at Israel Film Festival Luncheon

June 8, 2025

‘The Searchers,’ ‘Auntie Mame’ Actress Was 90

June 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp
Cybersecurity

Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp

HarishBy HarishApril 23, 2025No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


Russian Hackers Exploit Microsoft OAuth

Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights with an aim to gain unauthorized access to Microsoft 365 accounts since early March 2025.

The highly targeted social engineering operations, per Volexity, are a shift from previously documented attacks that leveraged a technique known as device code phishing to achieve the same goals, indicating that Russian adversaries are actively refining their tradecraft.

“These recently observed attacks rely heavily on one-on-one interaction with a target, as the threat actor must both convince them to click a link and send back a Microsoft-generated code,” security researchers Charlie Gardner, Josh Duke, Matthew Meltzer, Sean Koessel, Steven Adair, and Tom Lancaster said in an exhaustive analysis.

At least two different threat clusters tracked as UTA0352 and UTA0355 are assessed to be behind the attacks, although the possibility that they could also be related to APT29, UTA0304, and UTA0307 hasn’t been ruled out.

The latest set of attacks is characterized by the use of a new technique that’s aimed at abusing legitimate Microsoft OAuth 2.0 Authentication workflows. The threat actors impersonate officials from various European nations and have been found to take advantage of a compromised Ukrainian Government account at least in one case to trick victims into providing a Microsoft-generated OAuth code to take control of their accounts.

Cybersecurity

Messaging apps such as Signal and WhatsApp are used to contact targets, inviting them to join a video call or register for private meetings with various national European political officials or for upcoming events centered around Ukraine. These efforts seek to dupe victims into clicking links hosted on Microsoft 365 infrastructure.

“If the target responded to messages, the conversation would quickly progress towards actually scheduling an agreed-upon time for the meeting,” Volexity said. “As the agreed meeting time approached, the purported European political official would make contact again and share instructions on how to join the meeting.”

Russian Hackers Exploit Microsoft OAuth

The instructions take the form of a document, after which the supposed official sends a link to the target to join the meeting. These URLs all redirect to the official login portal for Microsoft 365.

Specifically, the supplied links are designed to redirect to official Microsoft URLs and generate a Microsoft Authorization Token in the process, which would then appear as part of the URI or within the body of the redirect page. The attack subsequently seeks to trick the victim into sharing the code with the threat actors.

This is achieved by redirecting the authenticated user to an in-browser version of Visual Studio Code at insiders.vscode[.]dev where the token is displayed to the user. Should the victim share the OAuth code, UTA0352 proceeds to generate an access token that ultimately allows access to the victim’s M365 account.

Volexity said it also observed an earlier iteration of the campaign that redirects users to the website “vscode-redirect.azurewebsites[.]net,” which, in turn, redirects to the localhost IP address (127.0.0.1).

Russian Hackers Exploit Microsoft OAuth

“When this happens, instead of yielding a user interface with the Authorization Code, the code is only available in the URL,” the researchers explained. “This yields a blank page when rendered in the user’s browser. The attacker must request that the user share the URL from their browser in order for the attacker to obtain the code.”

Another social engineering attack identified in early April 2025 is said to have involved UTA0355 using an already compromised Ukrainian Government email account to send spear-phishing emails to targets, followed by sending messages on Signal and WhatsApp.

These messages invited targets to join a video conference related to Ukraine’s efforts regarding investing and prosecuting “atrocity crimes” and the country’s collaboration with international partners. While the ultimate intention of the activity is the same as UTA0352, there is a crucial difference.

The threat actors, like in the other instance, abuse the legitimate Microsoft 365 authentication API to gain access to the victim’s email data. But the stolen OAuth authorization code is used to register a new device to the victim’s Microsoft Entra ID (formerly Azure Active Directory) permanently.

Cybersecurity

In the next phase, the attacker orchestrates a second round of social engineering in order to convince the targets to approve a two-factor authentication request and hijack the account.

“In this interaction, UTA0355 requested that the victim approve a two-factor authentication (2FA) request to ‘gain access to a SharePoint instance associated with the conference,'” Volexity said. “This was required to bypass additional security requirements, which were put in place by the victim’s organization, in order to gain access to their email.”

To detect and mitigate these attacks, organizations are advised to audit newly registered devices, educate users about the risks associated with unsolicited contacts on messaging platforms, and implement conditional access policies that restrict access to organizational resources to only approved or managed devices.

“These recent campaigns benefit from all user interactions taking place on Microsoft’s official infrastructure; there is no attacker-hosted infrastructure used in these attacks,” the company added.

“Similarly, these attacks do not involve malicious or attacker-controlled OAuth applications for which the user must explicitly grant access (and thus could easily be blocked by organizations). The use of Microsoft first-party applications that already have consent granted has proven to make prevention and detection of this technique rather difficult.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleCarlos Santana rushed to hospital prior to concert
Next Article Rusty Rabbit Giveaway [2025-04-16] – Anime News Network:IN
Harish
  • Website
  • X (Twitter)

Related Posts

New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally

June 8, 2025

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025

June 8, 2025

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

June 6, 2025

Empower Users and Protect Against GenAI Data Loss

June 6, 2025

Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam

June 6, 2025

Why More Security Leaders Are Selecting AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Meta reportedly in talks to invest billions of dollars in Scale AI

June 8, 2025

Debra Messing Honored at Israel Film Festival Luncheon

June 8, 2025

‘The Searchers,’ ‘Auntie Mame’ Actress Was 90

June 8, 2025

Annecy at 40 Sets the Animation Agenda

June 8, 2025
Don't Miss
Blockchain

The battle for gaming data is on.

June 8, 20254 Mins Read

Opinion by: T-RO, co-founder of GamerBoomForget the old pitch about “interactive media.” Every dungeon crawl,…

Bitcoin Family Splits Seed Phrase Across Four Continents After Crypto Attacks

June 8, 2025

Dubai Real Estate Hits $18.2B in Sales Amid Tokenization Push

June 8, 2025

Bitcoin market of 2025 driven by stablecoin regulation: Finance Redefined

June 6, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

Meta reportedly in talks to invest billions of dollars in Scale AI

June 8, 2025

Lawyers could face ‘severe’ penalties for fake AI-generated citations, UK court warns

June 7, 2025

Trump administration takes aim at Biden and Obama cybersecurity rules

June 7, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.