CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Malicious OAuth Apps in Microsoft 365 Environments

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Security researchers have identified a significant number of malicious OAuth applications in Microsoft 365 environments. These apps, often hidden within legitimate enterprise applications or application registrations, can be used by threat actors to gain unauthorized access to sensitive data. The issue is widespread, with approximately 10% of surveyed tenants containing at least one of these malicious apps. Researchers have developed tools and methodologies to detect and mitigate these threats, emphasizing the need for regular audits of OAuth applications. The discovery highlights the importance of vigilant monitoring and the use of specialized tools to identify and remove these hidden threats.

Timeline

  1. 20.10.2025 17:00 1 articles · 23h ago

    Discovery of Malicious OAuth Apps in Microsoft 365 Environments

    Researchers have identified a significant number of malicious OAuth applications in Microsoft 365 environments. These apps, often hidden within legitimate enterprise applications or application registrations, can be used by threat actors to gain unauthorized access to sensitive data. Approximately 10% of surveyed tenants contain at least one of these malicious apps. The discovery emphasizes the need for regular audits and the use of specialized tools to detect and mitigate these threats.

    Show sources

Information Snippets