Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Microsoft Entra ID, Azure Blob Storage, SharePoint, and MSBuild (Visual Studio Build Tools) are being actively abused in the TA416 European espionage campaign and passively through the LinkedIn browser fingerprinting behavior. TA416 is exploiting OAuth redirect abuse (CWE-601) against Entra ID to hijack authentication flows, using MSBuild as a living-off-the-land binary to deliver PlugX implants, and leveraging Azure Blob Storage and SharePoint as C2-adjacent staging infrastructure — no CVE is assigned as the exploitation targets configuration and authentication control gaps rather than unpatched software vulnerabilities. Priority actions are to audit and revoke unauthorized Entra ID OAuth application consent grants, block MSBuild.exe from executing in non-development environments via WDAC or AppLocker, and review Azure Blob and SharePoint access logs for anomalous service principal activity. Note: CVE-2025-31324 (SAP) and CVE-2025-0994 (Trimble) are listed as associated CVEs in the source item for this campaign but their direct integration into the TA416 attack chain is unconfirmed per source item caveats; they are not attributed here to Microsoft.

Author

Tech Jacks Solutions