Cyber Security News

Hackers Exploiting Microsoft 365 OAuth Workflows to Target Organizations

A new campaign by Russian threat actors. These actors are exploiting legitimate Microsoft OAuth 2.0 authentication workflows to compromise targeted organizations.

Since early March 2025, these sophisticated attacks have primarily focused on individuals and organizations with ties to Ukraine and human rights initiatives.

Social Engineering Campaign

The attackers, tracked as UTA0352 and UTA0355, have demonstrated a concerning ability to conduct highly targeted social engineering operations aimed at gaining unauthorized access to Microsoft 365 accounts.

Unlike previous phishing attempts, these attacks utilize legitimate Microsoft infrastructure, making detection significantly more challenging.

“These recent campaigns benefit from all user interactions taking place on Microsoft’s official infrastructure; there is no attacker-hosted infrastructure used in these attacks,” Volexity researchers noted in their analysis published Tuesday.

The primary victims include non-governmental organizations supporting human rights, think tanks, and organizations providing humanitarian assistance to Ukraine.

Security experts believe these groups are being targeted due to their reduced staffing and budget constraints, making them more vulnerable to sophisticated social engineering tactics.

Attack Methodology: Abusing Trust in Microsoft Services

The attackers initiate contact through secure messaging applications like Signal and WhatsApp, impersonating officials from various European nations, including Ukraine, Bulgaria, Romania, and Poland.

In one particularly concerning case, they leveraged a compromised Ukrainian Government account to establish initial credibility with targets.

Victims receive invitations to join purported video conferences or private meetings with European political officials to discuss Ukraine-related matters. Once engaged, targets are sent malicious Microsoft login URLs that generate OAuth authorization codes when clicked.

“If the victim shares the OAuth code, the attacker is then able to generate an access token that ultimately allows access the victim’s M365 account,” Volexity explains.

Attack Chain

What makes these attacks particularly effective is the exploitation of legitimate Microsoft authentication workflows. When victims click the provided links, they are directed to official Microsoft pages rather than prominent phishing sites.

In some instances, attackers use the stolen OAuth authorization code to permanently register new devices to the victim’s Microsoft Entra ID (formerly Azure AD), establishing persistent access to the compromised accounts.

Volexity researchers observed attackers downloading victims’ emails and accessing other sensitive account data after successfully compromising accounts.

The attackers carefully route their activities through proxy networks geolocated to match the victim’s location, further complicating detection efforts.

Security experts recommend organizations train users to be wary of unsolicited contacts via secure messaging apps, especially those requesting code sharing or URL information.

Implementing conditional access policies restricting access to only approved devices can also help mitigate these attacks.

Volexity attributes these campaigns to Russian threat actors with “medium confidence,” noting that all messages were themed around Ukraine and targeted individuals historically of interest to Russian intelligence operations.

“This latest series of attacks marks the second time since January 2025 that Russian threat actors have utilized little-known techniques to obtain access to M365 resources,” researchers concluded.

Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Leverage AutoIT Code to Deliver Malware Attacking Windows System

A sophisticated malware campaign utilizing multiple layers of AutoIT code has been discovered targeting Windows…

43 minutes ago

Hackers Exploits Windows Via UAC Bypass Technique to Deploy Remcos RAT

A newly identified phishing campaign deploys the Remcos Remote Access Trojan (RAT) using DBatLoader, leveraging…

56 minutes ago

67% of Organizations Faces Cyber Attack in The Past 12 Months – New Report

Cyber attacks continue to plague organizations worldwide, with a staggering 67% of businesses reporting they…

2 hours ago

Ivanti EPMM 0-day Vulnerability Actively Exploited in the Wild

Ivanti has disclosed two zero-day vulnerabilities in its Endpoint Manager Mobile (EPMM) solution. When chained…

2 hours ago

Hacker Charged for Hijacking SEC Account to Promote Fake Bitcoin News

Eric Council Jr., a 26-year-old man from Huntsville, Alabama, was sentenced on May 16, 2025,…

3 hours ago

AI Web Application Firewalls Bypassed Using Prompt Injection Techniques

Web Application Firewalls (WAFs) have been a critical defense mechanism protecting web applications from malicious…

3 hours ago