Hackers Exploit Fake Apps to Breach Microsoft 365 Accounts

Hackers Exploit Fake OAuth Apps and Phishing Kits

Cybersecurity researchers have uncovered a sophisticated cyberattack campaign where threat actors impersonate trusted companies using fake Microsoft OAuth applications to compromise Microsoft 365 accounts.

First identified in early 2025, this ongoing campaign uses phishing kits like Tycoon and ODx to bypass multi-factor authentication (MFA) and harvest user credentials, enabling account takeovers at scale.

How the Attack Works

The attack chain begins with phishing emails, often sent from compromised email accounts, that claim to share:

  • Requests for Quotes (RFQs)
  • Contract agreements
  • Invoices or payment details

These emails contain links that redirect victims to fake Microsoft OAuth app authorization pages, where a malicious app—often disguised as “iLSMART”—requests access to the user’s basic profile and other Microsoft 365 data.

⚠️ Important: ILSMart is a legitimate online marketplace used in aviation and defense sectors, making the spoof highly credible.

Identity Spoofing Meets Adversary-in-the-Middle (AitM) Phishing

Even if a user denies the app’s permission request, they are redirected to a CAPTCHA verification page, followed by a spoofed Microsoft login screen.

This fake login page is powered by Tycoon, a Phishing-as-a-Service (PhaaS) platform that:

  • Intercepts login credentials
  • Captures MFA tokens using AitM tactics
  • Enables real-time session hijacking

Widespread and Ongoing Campaigns

According to current research report, the attackers have impersonated over 50 enterprise applications, including:

  • 🔹 Microsoft SharePoint
  • 🔹 Adobe
  • 🔹 Docusign
  • 🔹 RingCentral

In 2025 alone, Tycoon-based phishing operations have attempted to compromise nearly 3,000 user accounts across more than 900 Microsoft 365 environments.

Other Recent Phishing Variants

The Tycoon toolkit has also been used in campaigns that:

  • Spoof Adobe-branded emails using Twilio SendGrid
  • Deliver fake “unsubscribe” or “document” flows that redirect users to phishing sites
  • Abuse AutoIt-based malware like VIP Keylogger to harvest sensitive data
  • Hide remote desktop software links (e.g., FleetDeck RMM) inside PDFs disguised as invoices, contracts, or real estate listings

Countries Targeted:

  • France
  • Belgium
  • Luxembourg
  • Germany

RMM Tools Used as Initial Access Vectors

In addition to fake OAuth apps, attackers have leveraged legitimate Remote Monitoring and Management (RMM) tools such as:

  • Action1
  • OptiTune
  • SuperOps
  • ScreenConnect
  • Syncro
  • Atera
  • Bluetrait

While no post-infection payloads have been confirmed, these tools are commonly used by ransomware gangs to gain persistent access and stage further attacks.

Microsoft’s Security Response

In response to the increasing abuse of OAuth and third-party app access, Microsoft is rolling out new security policies by August 2025, including:

  • Blocking legacy authentication protocols
  • Requiring admin consent for third-party OAuth apps

Additionally, Microsoft is planning to block external links to unsafe file types in Excel workbooks by default between October 2025 and July 2026.

Takeaways & Recommendations

  • Review OAuth app permissions across your Microsoft 365 environment
  • Enable MFA with phishing-resistant methods (like FIDO2 keys or Authenticator app)
  • Train users to recognize CAPTCHA + login combo scams
  • Monitor for unusual consent requests or admin grants
  • Restrict third-party app access by default unless explicitly approved

This campaign represents a major evolution in identity-based attacks, combining social engineering, OAuth abuse, and adversary-in-the-middle phishing to gain access to corporate environments.

As threat actors shift toward identity-driven compromise, security teams must adopt a zero-trust mindset, strengthen email defenses, and closely monitor third-party app integrations.

Sleep well, we got you covered.

Scroll to Top