Automatically translated.View original post

Beware of hackers using the OAuTH system to make phishing.

Malwarebytes warns. Beware of hackers using OAuTH to do phishing, tricking the release of malware.

OAuTH or Open Authorization may be a protocol that makes it easy to use applications that need to access data on the machine without any password, just choose whether to approve or disapprove, but this system that seems to be secure has been used by hackers.

According to a report by the official website of anti-malware developer Malwarebyte, a research team from Microsoft has detected hackers using OAuTh in combination with deception, causing victims to be deceived, phishing, or malware-addicted, by using Silent OAuth to help change the target of visiting websites (Redirect), bringing victims into infrastructure-linked websites that are unaware of the above crimes. Hackers do not have to steal tokens. The use of the victim is in any way. The procedure of the practice consists of multiple elements. This

First, a hacker sends a fraudulent email to the victim, saying that it comes from a government agency, social security, a tax agency, or a company that has a fraudulent link with a fraudster to open a document such as "View Document" or "Review Report," or a PDF file with a link inside it.

This is the link mentioned in the first verse, which usually makes a link for logging in to Google or Microsoft services. It usually starts a link similar to the common login of the two services, such as https: / / login [.] microsoftonline [.] com / or https: / / accounts [.] google [.] com /. At this point, there is no sign that the parameter (Parameter) like prompt = none, odd or empty scope, encoded state being put in is wrong.

Yet, in the URL parameters, there is a combination of Silent OAuth (prompt = none) with special parameters that will cause such procedures to fail (invalid or missing scope). At this point, the OAuth provider will have to recheck the session, including the Conditional Access condition, and the system will predict that the OAuth will not be silent as requested and then send back the OAuth error notification, such as interaction _ required, access _ tolerance, or consent _ required.

At this point, after sending the error back, by the design of this mechanism, the system will change the target of visiting a website on the web browser to the URI that the application associated with OAuth has registered, along with the state and error parameter. In this case, it will take the victim to the hacker's fraudulent domain. But from the user's point of view, it will be like switching a visit page from Google or Microsoft to a new page without seeing the error string.

The landing page that the victim is brought to is a website that actually mimics the login page or the website of a famous business brand. At this point, the victim can find two patterns.

The first is a Phishing scam page or an Attacker in the Middle or AitM page that comes with a login page that looks nothing wrong. Some pages also come with a Captcha authentication system for realism. If the victim enters a password with a Multi-Factors Authentication or MFA, the AitM tool captures information including information in the Session Cookies.

A malware download page with both automatic download and lure the victim to download it with buttons on the page, such as "Download the secure document" or "Meeting resources," etc.

As a result of such a form of deception, hackers behind it have a code to use the victim's accounts or may come in the form of a backdoor malware embedding. Therefore, for security purposes, users must avoid clicking any links before clicking. Make sure to check every time. If you click and find anything wrong, immediately close the tab or web browser, as well as regularly update the operating system, web browser, and cybersecurity tools to help protect the other layer.

# Trending # Lemon 8 Howtoo # lemon 8 diary # oauth # freedomhack

3/23 Edited to

... Read moreจากประสบการณ์ส่วนตัว การโจมตีแบบ Phishing ที่ใช้ประโยชน์จากระบบ OAuth เริ่มมีความซับซ้อนและหลอกลวงมากขึ้น เมื่อก่อนเราอาจจะรู้จักการติดกับดักผ่านอีเมลที่มีลิงก์ปลอมทั่วไป แต่ตอนนี้กลุ่มแฮกเกอร์ใช้เทคนิค Silent OAuth เพื่อหลอกให้เราคิดว่ากำลังล็อกอินผ่านเว็บไซต์ Google หรือ Microsoft จริงๆ โดยในเบื้องหลัง การเปลี่ยนเส้นทางลิงก์จะพาไปยังเว็บที่เหมือนกับของจริงอย่างมาก เช่น หน้าโหลดเอกสารหรือลงชื่อเข้าใช้ทั้งที่เป็นการขโมยข้อมูลเข้าสู่ระบบแทน ในบางครั้งหน้าเว็บปลอมจะติด CAPTCHA เพื่อความน่าเชื่อถือ ผู้ใช้งานจึงไม่สงสัยและกรอกข้อมูลการล็อกอินรวมถึงรหัสยืนยันตัวตนหลายชั้น (MFA) ซึ่งถือเป็นการเปิดประตูให้แฮกเกอร์เข้าถึงข้อมูลอย่างลึกซึ้งมากขึ้น สิ่งที่เรียนรู้คือ เราควรใส่ใจตรวจสอบ URL ให้ละเอียด การเห็น URL เริ่มต้นเหมือนที่คุ้นเคยไม่ได้หมายความว่าสามารถวางใจได้เสมอ ต้องตรวจสอบพารามิเตอร์แปลกๆ และถ้าเห็นข้อความเตือนหรือข้อผิดพลาดเกี่ยวกับ OAuth ที่ไม่เคยเจอมาก่อน ควรหยุดใช้งานเว็บไซต์นั้นทันที นอกจากนี้ การอัปเดตระบบระบบปฏิบัติการและโปรแกรมป้องกันไวรัสอย่างสม่ำเสมอ ช่วยป้องกันมัลแวร์และลดช่องโหว่ของระบบได้เป็นอย่างดี จากความเห็นส่วนตัว การตระหนักถึงภัยคุกคามและเพิ่มความระมัดระวังเวลาเปิดลิงก์หรือโหลดไฟล์จากอีเมลที่มาจากแหล่งที่ไม่ชัดเจน เป็นสิ่งสำคัญอันดับแรกที่ช่วยลดความเสี่ยงได้มากที่สุด ขอแนะนำให้ตั้งค่าการใช้ MFA และใช้โปรแกรมจัดการรหัสผ่านเพื่อเพิ่มความปลอดภัยในการล็อกอิน นอกจากนี้การตรวจสอบสิทธิ์เข้าถึงแอปภายนอกที่เชื่อมต่อกับบัญชี Google หรือ Microsoft ของเราอย่างสม่ำเสมอ ก็ช่วยลดความเสี่ยงที่ถูกโจมตีผ่านระบบ OAuth ได้อีกขั้นหนึ่ง

Related posts

scammers and hackers beware
Hudson
cercofhell

cercofhell

28 likes

Websites You NEED to Pass Your College Courses
Y’all college is hard enough without trying to figure everything out on your own 😩 So here’s my list of websites that actually helped me pass my classes like, these were in my survival kit. I’m not gatekeeping 🫶🏽 Quizlet When I needed to memorize terms FAST. I used it for flashcards, and the matc
Beauty

Beauty

273 likes

SECRETS Hackers DON’T Want You to Know!
After hackers got into my Facebook account and completely erased it, I dusted myself off and started a deep dive to understand why and how hackers work. The best way to protect yourself is to outsmart them. Here are 5 secrets Hackers DON'T want you to know! Share this with everyone! #lemon8pa
techgirljen

techgirljen

424 likes

SIEGEX is all CHEATERS & HACKERS😭
Why is this game full of cheaters and hackers and bugs🤷‍♀️ #siege #rainbowsixsiege #gaming #streamer #foryou
Phasma

Phasma

28 likes

BIG Holiday Costco Shop & Haul | Anchorage, Alaska
vanditsv

vanditsv

2 likes

Bigfoot Super Hackers.
#manthoughts #hackers #laughoutloud #bigfootvlog #lifetips
Alien Hayes

Alien Hayes

11 likes

Instagram is sharing your exact location to all your followers Turn this off ASAP. #techtips #instagram #news #technews
Cybersecurity Girl

Cybersecurity Girl

201 likes

Must-listen podcasts for cybersecurity
Cybersecurity moves fast. If you want to keep up with new threats, shifting trends, and real-world defense tactics, top security podcasts are one of the easiest ways to stay in the loop 😎👆 Find high-res pdf ebooks with all my cybersecurity related infographics at https://study-notes.org/cybersec
Dan Nanni

Dan Nanni

2 likes

Just An FYI This Is How So Many People are Getting Hacked!!! Plz Don’t Fall For Message Like These!!! it’s A Fake Account!!! #fakeaccount #hackers
MaryBell

MaryBell

2 likes

Hackers
How call of duty has me #call of duty #hacker #warzone
Stevie_Wonders

Stevie_Wonders

1 like

The QR Code SCAM! Don’t Fall For It!
Hackers are always finding new ways to get our information, and frankly, it sucks. The newest one I just found has to do with Amazon. Scammers are placing QR codes inside Amazon packages (you didn't order) asking for reviews or to visit a site. DON'T SCAN IT. It's a phishing attempt th
techgirljen

techgirljen

43 likes

Look world on Instagram account right now to removing my freedom of speech constitutional rights and laws Look world removing my freedom of speech constitutional rights and laws and complaints on bingo live right now this shit doesn't make sense everyday all day and night and morning harassing
glentrump359

glentrump359

0 likes

Kalebdavis19

Kalebdavis19

0 likes

I urge you to go Google this. These Hackers starte
Hollywood

Hollywood

0 likes

#yungblud
watch4hackers

watch4hackers

5 likes

you asked me to message you on telegram blocked
if you message me after a couple sentences ask me to message you on telegram I'm going to block you if you have telegram in your bio I'm going to immediately assume your sus.
subjectalpha one

subjectalpha one

4 likes

4 In demand Certificates You Need in 2025
Hey Career Girl, I know you want to start off the New Year on the right foot and a certificate is just the thing. Certificates can open the doors to new pathways in the career world that wouldn't have been opened before! Love this type of content? Follow and share! Need Interview P
Lauren|Career Girl

Lauren|Career Girl

162 likes

A rumor has been going around that Iranian hackers threatened to hack the U.S. credit system and boost everyone’s credit score. #fyp
iddy2707

iddy2707

2 likes

Your to-do list just got a personal manager
You know when you have too many tabs open in your brain? This app is like closing all of them... at once. Martin is your Al assistant that actually works like a real one. Need to text someone, forward notes, set reminders, or manage your day? Just tell Martin. It connects with your inbox,
Reverelia

Reverelia

360 likes

WARZONE HACKERS
Warzone is full hackers and call of duty does not care #warzone #hacker #memesdaily #memes🤣 #gaming
DUSTINMYRQ ™

DUSTINMYRQ ™

3 likes

warzone hackers be mad little babies
#cod #ps5 #gamergirl #warzone #fuckhackers
Twilightvile

Twilightvile

2 likes

A message to Minecraft hackers…
You should join the server #minecraft #gaming #fyp
BendersMC

BendersMC

13 likes

HACKERS IN THE BETA
Blackops 7 has hackers already…. #hacker #blackops7 #bo7
Goofstha

Goofstha

1 like

Do you like hackers?
#hacker #hackers #tricked #fyp
Lil Conscious

Lil Conscious

38 likes

Should hackers use billionaires’ money to pay off debt for 500 people in the comments? Yes! Abso-freaking-lutely! What if all your debt disappeared one day and you didn’t owe
Questioning the Cubicle 💅

Questioning the Cubicle 💅

2 likes

Look world just locked my Facebook account cause I was. Sharing my video Look world these meth going to crazy again the 7th time February 16,2026 on my bingo app right now harassing me cause I'm listening to the video of court day Morehouse parish sheriff department officers and Mike Stone Tubb
glentrump359

glentrump359

2 likes

OH HACKERS & SHIPMENT
#codm #fypシ #camogrind #hacker #fyp
GlockitSuckit

GlockitSuckit

2 likes

Blockchain's Core StrengthsThe core blockchain led
3. Security is Maturing (Evolving Weakness): • New layers of the crypto world, like smart contracts, are still in a rapid development phase, which is why vulnerabilities are common. This is why professional investors often look for projects that have been thoroughly audited by security firms. • A
Dragonak1754

Dragonak1754

1 like

King Trump
GrouchyGrandpaChannel

GrouchyGrandpaChannel

4 likes

These Hackers on Marvel Rivals getting crazy!
#marvelrivals #twitchtv #followme #Hackers #marvelfunny
MisFit Miracles

MisFit Miracles

1 like

SEPT WRAP UP PT 1.
september had me in a CHOKEHOLD y'all 😮‍💨 i read so much i have to break this into TWO PARTS 😂😂 • 47 books read (don't play with me •) • 19 new authors • multiple favorites that little binge had me blowing right past my 200 book goal, so you know i had to bump it up to 250 from messy d
LEXI 💓

LEXI 💓

32 likes

⚠️ The Hidden Dangers of Public Wi-Fi Free Wi-Fi feels convenient, but it can be a trap. Hackers can create what’s called an “evil twin” network—a fake hotspot that looks legitimate. The moment you connect, they can access your data, passwords, banking info, and private messages. Listen
Dannah Eve

Dannah Eve

82 likes

Hackers suck
Fastcarracer36

Fastcarracer36

7 likes

I wanted a real project I could actually show, not just talk about. So I used Atoms ⚛️ Check it out here: https://tinyurl.com/3xzc8xbe It feels like having a whole AI team helping me: 🔍 they do the deep research first 🏁 then Race Mode builds different versions so I can compare 👥 I just pick
emilie.studygram

emilie.studygram

19 likes

God, please unblock this android, hackers have in
Olga Ledbetter

Olga Ledbetter

37 likes

FBI and state police DEA and government judicial and president come get Elon Musk and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers I trying to go live on TikTok 6 they put restriction on all 6 of them to lock my lives and on YouTube channel right
glentrump359

glentrump359

0 likes

Prayers for Jamaica 🇯🇲 — opening Hacker’s Slumber,
Cousin B

Cousin B

0 likes

If you have the Samsung, you need to watch this and update your phone immediately 
Cybersecurity Girl

Cybersecurity Girl

46 likes

This could help you in the long run in cyber
#unfiltered #lemon8challenge As someone who has been in tech for now 5 year and just recently started into cybersecurity 💻 here are some like codes and hack that can help you in school and to also break into tech like myself‼️ #cybersecurity #womenintech #blackwomenintech #Lemon8 #l
Affinity B

Affinity B

232 likes

This table makes my space feel bigger than it is—because it works harder than any piece of furniture I own 🛋️🪄 #AnywaysWood #spacehackers #tinyhomeideas #cleverfurniture #hometricks
Amy

Amy

0 likes

Wz hackers
Who misses Warzone tempo movement gameplay I feel like it was honestly peak. I don’t think the game will ever reach that level again. There are too worried about selling bundles rather than fixing the game #wargaming #streamer #fypシ゚viral #teamwipewarzone #hackers
Sauccyyyjgaming

Sauccyyyjgaming

0 likes

Which of these video games would you play?
Hkohles1gaming

Hkohles1gaming

1 like

Ban Hackers
😃 #fcmobile #eafcmobile #fifamobile #fcmobile25 #eafc
manuelofficial_13

manuelofficial_13

4 likes

🚨 Canada Airport Hacked! Speakers Echo “Free Free Palestine” Across Terminals #AirTravel #AirportHack #BreakingNews #Canada #cyberattacks
🔥FAISAL.EDITz🔥

🔥FAISAL.EDITz🔥

0 likes

Hackers are using tricks & steal financial info.🌸🍋
SECURITY TIPS: Be careful from hackers they use multiple different types of software and tricks to steal data from computers, cell phones or other devices to steal your data, financial information and personal details. When they hack via computer systems Showing they are from Microsoft Security Ale
Mujahid Bakht

Mujahid Bakht

6 likes

I seriously think this is being kept from all Ding customers. #ring #ringdoorbell #ringcamera #hacked #hackers #fypシ #viralvideo @Ring
ashlee_shaw

ashlee_shaw

1 like

See more