CoPhish Attack Exploits Copilot Studio Agents to Steal Microsoft OAuth Tokens

A newly identified phishing technique known asย โ€œCoPhishโ€ย exploits Microsoft Copilot Studio agents to deliver deceptive OAuth consent prompts through legitimate Microsoft domains.

Researchers atย Datadog Security Labsย discovered the method, warning that Copilot Studioโ€™s high level of customization can unintentionally create new phishing vectors.

While the attack depends primarily onย social engineering, Microsoft confirmed that it is working on a fix.

A company spokesperson stated that Microsoft is โ€œtaking action to address it through future product updatesโ€ and remains focused on strengthening consent governance and implementing extra safeguards to prevent misuse.

How OAuth Tokens Work

In an OAuth consent phishing attack targeting Microsoft Entra ID, an adversary registers a malicious application that requests permissions to access or control a victimโ€™s data. The attacker then tricks the user into granting consent through Entra IDโ€™s legitimate application consent process.

Once consent is granted, the platform issues an access token with those permissions and redirects it to a URL controlled by the attacker.

This token can then be used to impersonate the victim, view emails, or access sensitive corporate resources.

Microsoft provides a detailed breakdown of this attack chain and its mitigations in itsย official security blog.

How it Works

Once a malicious Copilot Studio agentโ€™s demo page is activated, attackers can share its link through phishing emails or Microsoft Teams messages.

This is because the URL is hosted on an official Microsoft domain and visually resembles a legitimate Copilot page, victims may easily mistake it for a real service.

Datadogโ€™s Chris Knowles noted that a subtle clueโ€”the โ€œMicrosoft Power Platformโ€ icon could hint that something is amiss, though many users would likely overlook it.

When a victim clicks the login button and grants permissions, they are redirected through the legitimate Copilot authentication service at token.botframework.com.

Although this appears to be a standard Microsoft sign-in flow, the session token is covertly captured and forwarded to the attacker using tools such as Burp Collaborator, allowing the threat actor to hijack the session seamlessly.

The reason is because all authentication traffic is routed through Microsoftโ€™s infrastructure, it appears trustworthy and leaves no trace of suspicious activity in network logs.

Datadogโ€™s researchers detailed this entire exploit path from the victimโ€™s interaction with the malicious Copilot agent to the attackerโ€™s receipt of the stolen token in their analysis of the CoPhish attack.

Amaan Rizwan
Amaan Rizwan
Anything and everything because titles should not define us. A non-fiction lover. Khalid Hosseini and Ruskin Bond fan. Aspiring to be better than yesterday.
spot_img

Read More

Suggested Post