Wednesday, December 31, 2025

New ConsentFix Approach Methods Customers Into Handing Over OAuth Tokens


Researchers at Push Safety have noticed a brand new variant of the ClickFix assault that mixes “OAuth consent phishing with a ClickFix-style person immediate that results in account compromise.”

The method, which the researchers name “ConsentFix,” tips victims into copying and pasting a localhost URL containing an authorization token, then pasting it right into a phishing web page. 

“Authorization code circulation is an OAuth 2.0 protocol for internet functions to get a person’s permission to entry protected sources,” the researchers clarify.

“When utilizing the authorization code circulation to attach an app, it combines the code with an OAuth secret held by the app in change for a token (the precious half). Nonetheless, some apps can’t defend a secret — for instance, apps that run in your cellular machine or desktop. On this case, the code alone is sufficient to generate an OAuth token, with out the key — which is what’s being exploited right here.”

Within the assaults noticed by Push Safety, the risk actors abused the Azure CLI OAuth app to focus on Microsoft accounts.

“Basically, the attacker tips the sufferer into logging into Azure CLI, by producing an OAuth authorization code — seen in a localhost URL — after which pasting that URL (together with the code) into an attacker-controlled web page,” the researchers write. “This then creates an OAuth connection between the sufferer’s Microsoft account and the attacker’s Azure CLI occasion.”

Push Safety factors out that these assaults are very tough to dam, since they depend on reliable instruments and social engineering ways:

  • “The assault occurs fully contained in the browser context, eradicating one of many key detection alternatives for ClickFix (as a result of it doesn’t contact the endpoint).
  • “Delivering the lure through a Google Search watering gap assault fully circumvents email-based anti-phishing controls.
  • “Concentrating on a first-party app like Azure CLI implies that lots of the mitigating controls out there for third-party app integrations don’t apply — making this assault manner tougher to stop.
  • “As a result of there’s no login required, phishing-resistant authentication controls like passkeys haven’t any influence on this assault.”

KnowBe4 empowers your workforce to make smarter safety choices each day. Over 70,000 organizations worldwide belief the KnowBe4 HRM+ platform to strengthen their safety tradition and cut back human danger.

Analysis from Push Safety on a brand new variant of ClickFix assaults.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com