This campaign can give attackers access to an organization's Microsoft 365 email, SharePoint, Teams, and Azure resources without triggering MFA alerts — meaning security controls most organizations consider their primary cloud defense offer no protection here. A successful attack can result in business email compromise, data theft, ransomware staging, or regulatory breach notification obligations, all from a single employee clicking a link. Because the attack exploits Microsoft's own trusted application framework rather than a patchable flaw, there is no quick technical fix — exposure persists until organizations reconfigure identity and consent policies.
You Are Affected If
Your organization uses Microsoft Azure or Microsoft Entra ID (formerly Azure AD) for identity and access management
Users in your environment are permitted to grant OAuth consent to applications without IT admin approval
Your environment includes FOCI-eligible first-party Microsoft applications such as Azure CLI, Microsoft Office, or similar pre-trusted apps with existing user consent
You have not restricted user OAuth consent to verified publishers or implemented an admin consent workflow in Entra ID
You rely on MFA as the primary or sole control against unauthorized cloud access, without additional token anomaly detection or Conditional Access policies enforcing device compliance
Board Talking Points
Attackers are using a technique that bypasses multi-factor authentication entirely against Microsoft Azure environments, meaning our standard login protections do not stop this threat.
We need to immediately audit and restrict how our users authorize third-party and first-party applications in Microsoft 365 — this is a configuration and policy action, not a software patch.
Organizations that do not act face risk of undetected access to email, cloud data, and business systems with no authentication alerts generated.
GDPR — OAuth token theft can result in unauthorized access to personal data stored in Microsoft 365 and Azure, triggering breach notification obligations under Article 33 if personal data of EU residents is accessed
HIPAA — If Microsoft 365 or Azure services store or process protected health information under a BAA with Microsoft, unauthorized access via token theft constitutes a reportable breach under the HIPAA Breach Notification Rule
PCI-DSS — If Azure or Microsoft 365 environments are in scope for cardholder data environments, unauthorized access via OAuth token abuse may trigger incident response and notification requirements under PCI-DSS v4.0 Requirements 12.10