TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

6 Months of Researching OAuth Application Attacks | Huntress

2025-02-10 · Read original ↗

ATT&CK techniques detected

14 predictions
T1525Implant Internal Image
92%
“attack surface. stealthware : farm - to - table evil apps on the other hand, the azure app ecosystem also gives hackers the tools to build apps from the ground up that are designed to wreak havoc. i ’ m talking about farm - to - table, small - batch, home - grown, ethically - sou…”
T1525Implant Internal Image
88%
“? well, both of them burn when exposed to direct sunlight. but more importantly, both will evolve to the point where your current defenses are meaningless after enough time has passed. so onward we press to find new avenues of identifying and breaking their attack chains. one are…”
T1525Implant Internal Image
86%
“in the huntress partner tenancy, but they ' re way more prevalent than we anticipated. some of these apps had been around for years by the time we uncovered them. and if you take anything from this article, let it be this : statistically speaking, there ’ s a good chance that you…”
T1525Implant Internal Image
85%
“to a single user were more likely to be stealthware. the addition of classifying oauth permissions into groups based on what they allowed hackers to do during intrusions and detecting rare apps that also had powerful permissions raised the hit rate significantly. following our pr…”
T1525Implant Internal Image
85%
“sense of dread in me : how many are out there? in searching for the answers to these questions, we ended up getting way more than we bargained for. the systems at play : how oauth apps work hold onto your butts, because here ’ s a crash course in azure applications and how they w…”
T1525Implant Internal Image
75%
“re interested in that kind of thing. the hunt in motion with our threat model ironed out, it ’ s time to dive into the data and figure out the answer to the question : “ aside from that one termite, how many more are out there? ” to do this, myself and staff threat ops developer …”
T1525Implant Internal Image
73%
“6 months of researching oauth application attacks | huntress tl ; dr : if you administer at least one microsoft 365 tenant, audit your oauth applications right now. statistically speaking, there ’ s a good chance your tenant is infected with a malicious app. i wrote an open - sou…”
T1525Implant Internal Image
50%
“own user authentication, calls the graph api, wrangles the data from the api about your tenant ’ s enterprise applications and app registrations, and runs some hunting logic against the results. it ’ s quick and rough around the edges, but the idea here is to empower azure admins…”
T1525Implant Internal Image
46%
“that myself and other staff at huntress found themselves in when we started to look at the data about azure applications and how they ' re used maliciously in our partner tenants. so come along with us for a wild ride as we rip up the kitchen floorboards and uncover exactly how b…”
T1528Steal Application Access Token
41%
“6 months of researching oauth application attacks | huntress tl ; dr : if you administer at least one microsoft 365 tenant, audit your oauth applications right now. statistically speaking, there ’ s a good chance your tenant is infected with a malicious app. i wrote an open - sou…”
T1588.002Tool
41%
“crates, pry open doors if they ’ re stuck, and if you ’ re lucky, even escape from a massive underground research facility in the deserts of new mexico. if you got that last reference, you pass the vibe check. a crowbar alone is neither good nor bad. it ’ s useful in many differe…”
T1528Steal Application Access Token
35%
“to a single user were more likely to be stealthware. the addition of classifying oauth permissions into groups based on what they allowed hackers to do during intrusions and detecting rare apps that also had powerful permissions raised the hit rate significantly. following our pr…”
T1525Implant Internal Image
34%
“? anyone who has spent time administering a large, complicated system of authentication and authorization will tell you that attackers love to find the unpatchable cracks of the system to perform exploitation. any red teamer who has run a kerberoasting attack will tell you that t…”
T1528Steal Application Access Token
31%
“that myself and other staff at huntress found themselves in when we started to look at the data about azure applications and how they ' re used maliciously in our partner tenants. so come along with us for a wild ride as we rip up the kitchen floorboards and uncover exactly how b…”

Summary

There’s never just one termite. Huntress has spent the last 6 months researching and cracking down on malicious OAuth applications. Read about what we’ve found in this blog!