ConsentFix v3 Toolkit Automates OAuth Attacks Against Microsoft Azure Accounts


A new ConsentFix v3 toolkit is raising concern because it automates parts of an OAuth phishing attack against Microsoft Azure and Entra ID accounts. The technique can help attackers capture tokens without stealing a password directly.

Push Security says the toolkit has been promoted on a criminal forum and builds on earlier ConsentFix attacks. The first version used social engineering to trick users into copying a Microsoft login redirect URL that contained an OAuth authorization code.

The risk is serious because the user may interact with a real Microsoft login page. If the user is already signed in, the attack may require little more than selecting the existing account and moving the generated URL back into the phishing page.

What ConsentFix v3 changes

ConsentFix v3 keeps the same core idea as earlier versions. It abuses the OAuth 2.0 authorization code flow and targets trusted first-party Microsoft applications, such as Azure CLI.

The difference is automation. Push Security says the new toolkit helps attackers build infrastructure, create believable personas, manage phishing campaigns, capture OAuth material, and exchange it for session and refresh tokens.

This makes the attack easier to scale than the original version. Earlier ConsentFix attacks relied more heavily on manual steps, while the new toolkit shows how attackers can turn the flow into a repeatable phishing operation.

At a glance

ItemDetails
Attack nameConsentFix v3
Main targetMicrosoft Azure and Entra ID accounts
Main techniqueOAuth authorization code theft
Trusted app abusedFirst-party Microsoft apps such as Azure CLI
Main improvementAutomation of phishing setup, token exchange, and campaign management
Primary riskAccount takeover through stolen access and refresh tokens
Current statusPromoted as a toolkit, but large-scale real-world use remains unclear

How the attack tricks users

The phishing page can look like a normal Microsoft or Azure sign-in experience. In reality, it starts a legitimate OAuth flow and then waits for the victim to return the generated redirect URL.

That URL can contain an authorization code. If attackers capture it quickly enough, they can exchange it for tokens and access Microsoft resources allowed by the targeted app and the victim’s permissions.

This makes the attack different from normal password phishing. The attacker does not need the victim’s password if the OAuth flow produces usable tokens.

Why first-party Microsoft apps matter

ConsentFix attacks are powerful because they can target first-party Microsoft apps that users and tenants already trust. Azure CLI is one example that appears in research on this technique.

These apps exist for legitimate administrative and developer workflows. They can also have broad trust inside Microsoft environments, which makes them attractive to attackers.

Generating personalized phishing emails

Push Security says this trust model can make mitigation difficult. Blocking every trusted Microsoft app is not realistic for many organizations because it may break normal business and engineering workflows.

ConsentFix v3 uses common SaaS tools

The toolkit described by Push Security uses a mix of common SaaS and open-source tools. These can support target research, hosting, phishing delivery, token capture, and post-compromise activity.

Push Security said the toolkit referenced services such as Cloudflare Workers, ZoomInfo, Dropbox, and Pipedream. Pipedream can act as a webhook and automation layer that receives OAuth material and exchanges it for tokens.

Attackers can also use post-exploitation tools to interact with the compromised Microsoft environment after importing the stolen tokens.

Why this can bypass normal defenses

ConsentFix works inside the browser and uses real Microsoft authentication flows. That makes it harder for traditional endpoint tools to detect because no malware needs to run on the device.

It can also bypass user expectations. Employees know to avoid suspicious password pages, but they may not recognize a request to drag, drop, or paste a localhost URL as a phishing step.

OAuth-based attacks also reduce the usefulness of password resets alone. If attackers already obtained valid refresh tokens, defenders must revoke sessions and tokens, not just change the account password.

What security teams should check

  • Review Entra ID sign-in logs for unusual first-party app activity.
  • Hunt for suspicious Azure CLI or Microsoft app token activity from unfamiliar IP addresses.
  • Review OAuth grants and delegated permissions across the tenant.
  • Watch for users accessing phishing pages that request copied URLs or drag-and-drop actions.
  • Revoke refresh tokens and sessions for accounts suspected of exposure.
  • Apply Conditional Access controls and token protection where supported.
  • Train users to report any page that asks them to paste a Microsoft redirect URL.

Mitigation is not simple

Microsoft’s Token Protection feature can help reduce token replay by binding supported sign-in session tokens to a device. This can make stolen tokens less useful in supported scenarios.

Admins should also follow Microsoft’s guidance for detecting and remediating illicit consent grants. That includes reviewing OAuth applications, delegated permissions, and sign-in activity connected to suspicious apps.

However, ConsentFix v3 also shows why identity security needs browser-level visibility. If the attack happens through a real login flow and a convincing browser prompt, email filters and endpoint defenses may miss the most important step.

Real-world impact is still developing

Push Security described ConsentFix v3 as a sign of where OAuth phishing may be heading, rather than a mature phishing-as-a-service platform at industrial scale.

The company also noted that its testing used personal Microsoft accounts, which limits how much can be said about enterprise impact. In a real business tenant, the damage would depend on the targeted app, token scope, user permissions, and tenant controls.

Still, defenders should not wait for a larger campaign before acting. Device code phishing grew after criminal toolkits made it easier to run, and ConsentFix could follow a similar path.

FAQ

What is ConsentFix v3?

ConsentFix v3 is a toolkit that automates parts of an OAuth phishing technique targeting Microsoft Azure and Entra ID accounts.

Does ConsentFix v3 steal passwords?

No. The attack focuses on stealing OAuth authorization material and exchanging it for tokens. This can give attackers access without directly stealing a password.

Why does MFA not fully stop this attack?

The user may complete a legitimate Microsoft login flow. If the attacker captures the resulting OAuth code or token material, MFA has already happened or may not be prompted again.

Which Microsoft app is commonly mentioned in ConsentFix research?

Azure CLI is commonly mentioned because it is a trusted first-party Microsoft application used in legitimate cloud administration and developer workflows.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages