Home OSINT News Signals
CYBER

ThreatsDay Bulletin: OAuth Consent Fatigue, EDR Evasion, and Emerging Cyber Threats Demand Vigilance

đź•“ 2 min read

The cybersecurity landscape continues to evolve at a breakneck pace, with each week introducing a blend of sophisticated new techniques and refined old tricks. This week's threat intelligence underscores a familiar yet increasingly dangerous pattern: attackers are expertly exploiting user behavior, undermining foundational security assumptions, and leveraging obscure corners of digital infrastructure. From polished social engineering to novel technical exploits, the findings highlight an environment where both human factors and technological blind spots are being aggressively targeted. The convergence of these trends suggests that several of these methods will transition from research concepts to active, real-world incidents sooner than the security community would prefer.

A critical warning from cloud security firm Wiz has brought the threat of malicious OAuth applications back into sharp focus. The attack exploits "consent fatigue," a phenomenon where users, overwhelmed by frequent permission requests, hastily grant access without proper scrutiny. Attackers deploy rogue OAuth apps with legitimate-sounding names, tricking users into adding them to their company's tenant. As Wiz explains, once a user clicks "Accept," the sign-in process completes and an access token is sent directly to the attacker's controlled redirect URL. This token grants the attacker immediate access to the user's sensitive resources, such as files and emails, completely bypassing the need for password theft. Notably, Wiz detected a large-scale campaign in early 2025 involving 19 distinct OAuth applications impersonating trusted entities, demonstrating the industrial scale of this threat.

Parallel to identity-based attacks, significant advancements in endpoint evasion have emerged. Researchers have detailed a new class of tools dubbed "EDR killers," designed to subvert Endpoint Detection and Response systems by exploiting vulnerabilities in their drivers or using legitimate administrative tools to disable security processes. These techniques represent a direct escalation in the attacker-defender arms race, moving beyond mere malware obfuscation to actively dismantle the security software itself. Furthermore, novel phishing campaigns have begun exploiting trusted platforms like Signal, using voicemail notification lures to steal credentials, while the resurgence of "Zombie ZIP" attacks—which use deeply nested archive files to crash security scanners—shows how old vulnerabilities can be repurposed for new disruption.

The threat landscape is further complicated by incidents targeting the AI ecosystem, where vulnerabilities in machine learning platforms have been exploited to gain unauthorized access and potentially poison training data. This, combined with the persistent issue of infrastructure being compromised for "too professional" command-and-control operations, paints a picture of a deeply interconnected and fragile digital environment. The weakest link often remains human—users clicking on malicious links—but the tools and infrastructure at an attacker's disposal are becoming more powerful and stealthy. For security professionals, this week's bulletin is a stark reminder that defense requires constant adaptation, user education on threats like consent fatigue, and a proactive approach to hunting for the subtle anomalies that indicate these advanced attacks are already underway.

Telegram X LinkedIn
Back to News