Go Back   Carder.life > [en] International Forum > Carding News



Reply
 
Thread Tools Display Modes
  #1  
Old 01-10-2025, 01:17 AM

Artifact Artifact is offline
Administrator
Join Date: Jan 2024
Posts: 0
Default


Threat analysts have observed a new campaign named ‘OiVaVoii’, targeting company executives and general managers with malicious OAuth apps and custom phishing lures sent from hijacked Office 365 accounts.
According to a report from Proofpoint, the campaign is still ongoing, though Microsoft is monitoring the activity and has already blocked most of the apps.
The impact of executive account takeovers ranges from lateral movement on the network and insider phishing to deploying ransomware and business email compromise incidents.
Employing OAuth apps
OAuth is a standard for token-based authentication and authorization, removing the need to enter account passwords.
Apps that use OAuth require specific permissions such as file read and write permissions, access to calendar and email, and email send authorization.
The purpose of this system is to offer increased usability and convenience while maintaining a high security level within trustworthy environments by reducing credential exposure.
With OAuth tokens, cloud-based third-party applications can access the data points required to provide businesses with productivity features without getting the users’ passwords.
The actors behind the OiVaVoii campaign used at least five malicious OAuth applications, four of them currently blocked: ‘Upgrade’, ‘Document’, ‘Shared’, and ‘UserInfo’.

Malicious OAuth apps employed in the campaign
Three of these apps were created by verified publishers, which indicates that the threat actors compromised the account of a legitimate Office tenant.
The threat actors then used the apps to send out authorization requests to high-ranking executives in the targeted organizations. In many cases, the recipients accepted the requests, seeing nothing suspicious in them.
When victims hit the Accept button, the threat actors use the token to send emails from their accounts to other employees within the same organization.

OAuth app using Microsoft logo and a verified publisher
If they click on Cancel, a manipulation in the Reply URL redirects them back to the consent screen, locking them on the same page until they accept the permission request.
Proofpoint also mentions the likelihood of man-in-the-middle proxy attacks that could also compromise the target’s account credentials.
Campaign is still active
Four of the malicious OAuth apps used by the actors in this campaign have been blocked, but new ones are being created and employed in the same way.
Also, executives who have already been compromised and given access to their accounts remain high-risk points for impacted organizations.
The potentially compromised firms need to revoke the permissions, delete the apps, remove any malicious mailbox rules added by the actors, and scan for any dropped files.
Finally, all employees should be trained to suspect internal communications, especially messages from high-ranking executives that don’t align with their standard business practices.
  #2  
Old 01-10-2025, 01:28 AM

bingo bingo is offline
Banned
Join Date: Oct 2021
Posts: 5
Default


where can I get access to this kind of stuff?
Reply

Tags
NULL


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump




All times are GMT. The time now is 05:42 AM.