Phishing Education

Consent Phishing: How OAuth Permission Requests Steal Account Access

By AntiPhishers Published

Consent Phishing: How OAuth Permission Requests Steal Account Access

Security Education: This article describes cyber threats for defensive awareness and education purposes only. Understanding how attacks work helps organizations and individuals protect themselves. Never use this information for unauthorized access or malicious purposes.

Consent phishing represents a sophisticated evolution of credential theft that does not require capturing passwords at all. Instead of directing victims to fake login pages, attackers create malicious applications that request legitimate OAuth permissions from the victim’s account. When the user grants consent, the application receives an access token that provides persistent access to their data without needing their password or triggering multi-factor authentication.

OAuth is the standard protocol that allows third-party applications to access your data on services like Microsoft 365, Google Workspace, and social media platforms. When you authorize a legitimate app, you grant specific permissions such as reading your email, accessing your calendar, or managing your files. This system powers the ecosystem of connected apps and integrations that modern productivity depends on.

Consent phishing abuses this mechanism. The attacker creates a malicious application and registers it with the target platform. They then send the victim a link that triggers the platform’s standard permission request screen. Because the consent prompt comes from the legitimate service, not from a fake page, the victim sees a genuine Microsoft or Google authorization screen and may grant access without hesitation.

Once consent is granted, the attacker’s application receives an access token that provides ongoing access to the permitted resources. This token works independently of the user’s password and is not invalidated by password changes. Multi-factor authentication does not apply because the application has already been authorized through the legitimate consent flow.

What Makes This Attack Particularly Dangerous

Traditional phishing defenses are largely ineffective against consent phishing. Password managers will not flag the consent screen as a fake login because it is not a login page. Multi-factor authentication has already been completed during the legitimate sign-in session. Email filtering cannot detect the attack because the phishing link leads to a genuine authorization page hosted by the real service provider.

The permissions granted can be extremely broad. A malicious application might request access to read and send email, access all files, view contacts, and manage calendar entries. With email access, the attacker can conduct further phishing from the victim’s account, exfiltrate sensitive data, and monitor communications for valuable information.

Token persistence means the attacker retains access even after the victim changes their password or enables additional security measures. Unless the victim specifically revokes the application’s permissions, the attacker maintains access indefinitely.

The primary warning sign is an unexpected application requesting permissions. If you did not initiate an app installation or integration, any consent prompt should be treated with suspicion. Examine the application name, developer information, and requested permissions carefully before granting access.

Be wary of applications requesting more permissions than their stated purpose requires. A document viewer that requests email sending capabilities or a calendar tool that wants access to all your files is requesting suspicious scope.

Check whether the application is verified by the platform. Major cloud services distinguish between verified and unverified applications, and unverified apps requesting broad permissions represent significant risk.

Defensive Measures

Regularly audit the third-party applications connected to your accounts. Both Microsoft and Google provide interfaces to view and revoke application permissions. Remove any application you do not recognize or no longer use.

Organizations should configure their cloud platforms to restrict which applications users can authorize. Requiring administrative approval for new application consent prevents individual employees from granting access to unvetted applications.

For more on protecting your account credentials, see our guide on Credential Harvesting: How Attackers Steal Your Logins. You can also learn about related defensive strategies in our article on What Is Phishing? A Complete Guide to Recognizing and Avoiding Attacks.

Organizational Controls for OAuth Security

Enterprise environments should implement application consent policies that whitelist approved applications and block or require admin approval for all others. Monitoring tools that alert on new application consent events enable security teams to investigate and revoke unauthorized access quickly. Educating employees about the difference between logging in and granting application consent closes the awareness gap that consent phishing exploits, and regular reviews of authorized applications ensure that accumulated permissions do not create an expanding attack surface over time.

Sources