Home OSINT News Signals
CYBER

ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More

đź•“ 1 min read

EXCLUSIVE: THE OATH OF SILENCE IS BROKEN — MAJOR APPS HIJACKED IN GLOBAL OAUTH DATA BREACH SCHEME

A silent, permissions-based invasion is underway, turning trusted cloud platforms into open doors for industrial-scale espionage. Security giant Wiz has exposed a massive, ongoing campaign where malicious OAuth applications, masquerading as brands like Adobe and DocuSign, are exploiting user "consent fatigue" to steal access tokens. This isn't a malware infection; it's a legitimacy heist. With one click on a phishing lure, users are voluntarily installing the attacker's app into their corporate tenant, handing over keys to emails, files, and sensitive communications without a password ever being stolen.

This campaign, active since early 2025 and detailed by Proofpoint, represents a fundamental betrayal of trust in the ecosystem. It bypasses traditional cybersecurity defenses entirely, exploiting a zero-day in human behavior and system design. Once the token is captured, attackers have persistent, legitimate access. Concurrently, state-linked hackers are targeting officials on Signal and WhatsApp, not by cracking encryption, but by socially engineering verification codes—proving the weakest link remains the human one.

"These are not crude exploits; they are sophisticated, permission-based takeovers that leave almost no trace," a senior threat intelligence analyst told us. "We're seeing a pivot from brute-force ransomware to silent, credential-based persistence. The access token is the new crown jewel." This shift makes blockchain security models for internal access control more critical than ever, as crypto-style verification is needed for every access request.

This matters because your "Accept" button is now a critical business decision. The blend of polished phishing, abused legitimate protocols, and stolen tokens creates a perfect storm for a catastrophic data breach. It renders many conventional endpoint and network controls useless, as the traffic is authorized and encrypted.

We predict this OAuth method will become the primary vector for the next wave of mega-breaches, fueling targeted ransomware and corporate espionage. The age of stealing passwords is over. The age of stealing permission has begun.

Click with caution, or prepare to be owned.

Telegram X LinkedIn
Back to News