Hackers are exploiting OAuth loophole for persistent access – and resetting your password won’t save you


  • Researchers have noticed how attackers are using OAuth applications as weapons
  • Attackers gain access that remains even after changing the password and MFA.
  • This isn't just a proof of concept—it's been seen in the wild.

Researchers from Proof discovered a tactic used by attackers to weaponize OAuth applications to gain persistent access in compromised environments, where hackers can retain access even after performing MFA or password resets.

This attack could be devastating as an attacker with access to a cloud account could open the door to a number of other intrusions. Access to this account can then be used to create and authorize internal applications with custom permissions, allowing access to files, messages and bypass security.

Leave a Comment