New ConsentFix attack hijacks Microsoft accounts via Azure CLI
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述即可。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是一个新的网络攻击方法,叫做ConsentFix,是ClickFix攻击的一种变种。这种攻击利用了Azure CLI的OAuth应用来劫持微软账户,不需要密码或绕过多因素认证。 接下来,我需要提取关键点:攻击名称、利用的技术、攻击方式、影响以及如何防范。然后把这些信息浓缩到100字以内。 可能的结构是:先介绍攻击名称和目标,然后说明攻击过程和影响,最后提到防御措施。这样既全面又简洁。 现在开始组织语言:“ConsentFix是一种新型网络攻击方法,通过滥用Azure CLI的OAuth应用劫持微软账户。攻击者诱导用户完成OAuth流程并窃取授权码,从而无需密码或绕过多因素认证获取账户访问权限。” 这样大概在100字左右,涵盖了主要信息,并且直接描述了内容。 </think> ConsentFix是一种新型网络攻击方法,通过滥用Azure CLI的OAuth应用劫持微软账户。攻击者诱导用户完成OAuth流程并窃取授权码,从而无需密码或绕过多因素认证获取账户访问权限。 2025-12-11 15:15:26 Author: www.bleepingcomputer.com(查看原文) 阅读量:5 收藏

Microsoft

A new variation of the ClickFix attack dubbed 'ConsentFix' abuses the Azure CLI OAuth app to hijack Microsoft accounts without the need for a password or to bypass multi-factor authentication (MFA) verifications.

A ClickFix attack is a social engineering technique that attempts to trick users into running commands on their computer to install malware or steal data. They commonly use fake instructions that pretend to fix an error or verify that they are human and not a bot.

This new ConsentFix variant was discovered by cybersecurity firm Push Security, which explains that the ConsentFix technique steals OAuth 2.0 authorization codes that can be used to obtain an Azure CLI access token.

Azure CLI is a Microsoft command-line application that uses an OAuth flow to let users authenticate and manage Azure and Microsoft 365 resources from their local machine. In this campaign, attackers trick victims into completing that Azure CLI OAuth flow and then steal the resulting authorization code, which they exchange for full account access without needing the user's password or MFA.

The ConsentFix attack

A ConsentFix attack starts with the victim landing on a compromised, legitimate website that ranks high on Google Search results for specific terms.

The visitor is shown a fake Cloudflare Turnstile CAPTCHA widget that asks for a valid business email address. The attacker's script checks this address against a list of intended targets, filtering out bots, analysts, and anyone else not on the target list.

Victim prompted to enter their email address
Victim prompted to enter their email address
Source: Push Security

Users who pass this check are shown a page that resembles ClickFix interaction patterns, providing the victim with instructions to verify they are human.

These instructions are to click the 'Sign in' button on the page, which opens a legitimate Microsoft URL in a new tab. 

The ClickFix-styled page that steals the URL with the code
The ClickFix-styled page that steals the URL with the code
Source: Push Security

However, this is not your typical Microsoft login prompt, but rather an Azure login page used to generate an Azure CLI OAuth access code.

Microsoft Azure CLI login page
Microsoft Azure CLI login page
Source: BleepingComputer

If the user is already logged into the Microsoft account, they only need to select their account; otherwise, they authenticate normally on Microsoft's real login page.

Once this happens, Microsoft redirects them to a localhost page, and the browser address bar now displays a URL containing an Azure CLI OAuth authorization code tied to the user's account.

The phishing process completes when the user pastes the URL into the malicious page, as per the provided instructions, granting the attacker access to the Microsoft account via the Azure CLI OAuth app.

"Once the steps are completed, the victim has effectively granted the attacker access to their Microsoft account via Azure CLI," explains Push.

"At this point, the attacker has effective control of the victim's Microsoft account, but without ever needing to phish a password or pass an MFA check."

"In fact, if the user was already logged in to their Microsoft account (i.e., they had an active session), no login is required at all."

Push says the attack triggers only once per victim IP address, so even if valid targets return to the same phishing page, they will not get the Cloudflare Turnstile check.

The researchers suggest that defenders look for unusual Azure CLI login activity, such as logins from new IP addresses, and monitor for legacy Graph scopes, which attackers intentionally leverage to evade detection.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/new-consentfix-attack-hijacks-microsoft-accounts-via-azure-cli/
如有侵权请联系:admin#unsafe.sh