"Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing"

Microsoft has warned that attackers are deploying Virtual Machines (VMs) for cryptocurrency mining and launching phishing attacks using Open Authorization (OAuth) applications as an automation tool. According to a Microsoft Threat Intelligence team analysis, threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can then use to hide malicious activity. Misuse of OAuth also allows threat actors to maintain access to applications even if they lose access to the compromised account. This article continues to discuss the exploitation of OAuth applications by hackers for cryptocurrency mining and phishing attacks.

THN reports "Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing"

Submitted by grigby1

Submitted by grigby1 CPVI on