Cybercriminals are selling malicious Microsoft OAuth apps that masquerade as Adobe and DocuSign apps to ship malware and steal Microsoft 365 accounts credentials.
The campaigns had been found by Proofpoint researchers, who characterised them as “extremely focused” in a thread on X.
The malicious OAuth apps on this marketing campaign are impersonating Adobe Drive, Adobe Drive X, Adobe Acrobat, and DocuSign.

Supply: Proofpoint
These apps request entry to much less delicate permissions comparable to ‘profile’, ‘e mail’, and ‘openid,’Â to keep away from detection and suspicion.
If these permissions are granted, the attacker is given entry to:
- profile – Full identify, Person ID, Profile image, Username
- e mail – major e mail deal with (no inbox entry)
- openid – permits affirmation of person’s identification and retrieval of Microsoft account particulars
Proofpoint informed BleepingComputer that the phishing campaigns had been despatched from charities or small corporations utilizing compromised e mail accounts, probably Workplace 365 accounts.
The emails focused a number of US and European industries, together with authorities, healthcare, provide chain, and retail. Among the emails seen by the cybersecurity agency use RFPs and contract lures to trick recipients into opening the hyperlinks.
Whereas the privileges from accepting the Microsoft OAuth app solely offered restricted information to the attackers, the knowledge may nonetheless be used for extra focused assaults.
Moreover, as soon as permission is given to the OAuth app, it redirects customers to touchdown pages that show phishing varieties to Microsoft 365 credentials or distributed malware.
“The victims went via a number of redirections and phases after authorizing O365 OAuth app, till offered with the malware or the phishing web page behind,” Proofpoint informed BleepingComputer.
“In some instances, the victims had been redirected to an “O365 login” web page (hosted on malicious area). In lower than a minute after the authorization, Proofpoint detected suspicious login exercise to the account.”
Proofpoint stated that they may not decide the malware being distributed, however the attackers utilized the ClickFix social engineering assault, which has develop into highly regarded over the previous yr.

Supply: Proofpoint
The assaults are just like these reported years in the past, indicating that OAuth apps stay an efficient approach to hijack Microsoft 365 accounts with out stealing credentials.
Customers are suggested to be cautious with OAuth app permission requests and all the time confirm their supply and legitimacy earlier than approving them.
To verify present approvals, go to ‘My Apps’ (myapplications.microsoft.com) → ‘Handle your apps’ → and revoke any unrecognized apps on that display screen.
Microsoft 365 directors may also restrict customers’ permission to consent to third-party OAuth app requests totally via ‘Enterprise Functions’ → ‘Consent and Permissions’ → set’ Customers can consent to apps’ to ‘No.’