Home Security #oauth

Tagged #oauth

7 posts

Microsoft 365 OAuth Consent Defense

OAuth consent phishing against Microsoft 365 — what happens when no password is stolen

The attacker registers an app in their own tenant, tricks a user into clicking Accept, and gets Microsoft-signed …

Overview / Threat Model 12 min
Microsoft 365 OAuth Consent Defense

Five Sentinel detections for OAuth consent attacks (with the KQL inline)

Suspicious consent grant, mass campaign, anomalous SP sign-in, post-consent credential addition, and Graph API mass read. Plus a …

Detection 11 min
Microsoft 365 OAuth Consent Defense

Why Conditional Access will not stop OAuth consent attacks (and what will)

CA gates sign-in. Consent happens after sign-in. Real prevention lives in three Entra ID consent-framework settings most established …

Mitigation 12 min
Microsoft 365 OAuth Consent Defense

Containing an OAuth consent compromise — the four moves you have to make in order

Revoke grants. Disable the SP. Revoke refresh tokens. Tenant-block the AppId. Order matters and most SOCs do it …

Playbook 12 min
Gmail BitM Defense

Browser-in-the-Middle attacks against Gmail — what makes them different from AiTM

BitM streams a real attacker-controlled browser to the victim instead of cloning HTML. FIDO2 does not help. The …

Overview / Threat Model 9 min
Gmail BitM Defense

Detecting BitM against Gmail — network signals, browser signals, and the Workspace audit query

RFB protocol handshake on a WebSocket. Canvas-rendered login pages with no password input in the DOM. Input lag …

Detection 11 min
Gmail BitM Defense

Responding to a Gmail BitM compromise — the OAuth-revoke step every other playbook skips

Password rotation does not revoke the OAuth refresh token. Sign-out-all-sessions does not revoke the OAuth refresh token. Until …

Playbook 11 min