Security & Infrastructure Tools
ConsentFix v3 Attacks Target Azure with Automated OAuth Abuse
Researchers warn of ConsentFix v3, a new automated OAuth abuse campaign targeting Microsoft Azure. The refinement verifies Azure tenants, gathers employee details for impersonation, and coordinates phishing and exfiltration across services (Outlook, Tutanota, Cloudflare, DocSend, Hunter.io, and Pipedream) to capture OAuth codes and tokens. A Cloudflare Pages phishing page prompts a real Microsoft OAuth flow, with a Pipedream webhook receiving the code, exchanging it for tokens, and feeding them to Specter Portal to access compromised resources. Mitigations include token binding, behavioral detection, and app-auth restrictions, but the campaign’s reach and impact remain unclear.

ConsentFix V3 Attacks Target Azure with Automated OAuth Abuse
OverviewA new attack variant named ConsentFix v3 has emerged in hacker forums, touted as an automated enhancement of previous ConsentFix campaigns against Microsoft Azure. Building on earlier approaches that manipulated the OAuth authorization flow, v3 adds automation and scalability to the technique, focusing on first-party Microsoft apps that are pre-trusted and pre-consented. The core idea remains exploiting the OAuth2 authorization code flow to obtain tokens without requiring user passwords, thereby bypassing MFA in practice when tokens are stolen or misused.
Background and Evolution
- ConsentFix (v1): First introduced as a variation of the ClickFix phishing strategy, this variant encouraged victims to authenticate through a legitimate Microsoft login flow via the Azure CLI. The attack relied on social engineering to trick users into pasting a localhost URL containing an OAuth authorization code, enabling token acquisition and account hijacking without passwords.
- ConsentFix (v2): A refinement that replaced manual copy/paste with drag-and-drop of the localhost URL, smoothing the phishing flow and making it more convincing. Researchers noted improved success thanks to a more seamless user interaction.
- ConsentFix (v3): The latest iteration preserves the same authorization-code abuse concept but adds automation and cloud-based hosting to scale operations. It targets first-party Microsoft apps and integrates a new automation backbone, enabling faster token exchanges and real-time data handling.
Technical Flow of ConsentFix V3
Initial environment reconnaissance
- The attackers begin by checking for Azure presence in the target environment, looking for valid tenant IDs to confirm potential footholds.
- They gather employee information (names, roles, email addresses) to support impersonation and social engineering efforts.
Account creation and infrastructure setup
- To support phishing, hosting, data gathering, and exfiltration, attackers create multiple accounts across services including Outlook, Tutanota, Cloudflare, DocSend, Hunter.io, and Pipedream.
- Pipedream plays a central role in three critical areas:1) It acts as the webhook endpoint that receives the victim’s authorization code.2) It functions as the automation engine that immediately exchanges the code for a refresh token via Microsoft’s API.3) It serves as a central collector, making captured tokens available in real time to attackers.
Phishing page deployment and user interaction
- A phishing page is deployed on Cloudflare Pages, designed to mimic a legitimate Microsoft/Azure interface and initiate a real OAuth flow through Microsoft’s login endpoint.
- When a user engages with the page, they are redirected to a localhost URL containing an OAuth authorization code. The user is tricked into pasting or dragging this URL back into the phishing page.
- The data exfiltration pipeline is activated: the captured URL is sent to the Pipedream webhook, and the backend automation exchanges the authorization code for tokens without further user intervention.
Credential harvesting and email personalization
- The phishing emails can be highly personalized, generated from harvested data to increase credibility.
- Malicious links are embedded inside PDFs hosted on DocSend to bypass filters and improve the likelihood that targets engage.
Data exfiltration and post-exploitation
- After tokens are obtained, they are imported into Specter Portal, enabling attackers to interact with compromised Microsoft environments.
- The tokens grant access to resources tied to the account, including email, files, and other services, depending on the scope of the permissions and the tenant’s settings.
Testing realities and impact considerations
- Push Security researchers note that their testing relied on personal Microsoft accounts, which means the true impact is difficult to quantify without broader deployment. The reach and damage depend on permissions, services, and tenant configurations.
- The vulnerability is closely tied to the trust Microsoft places in first-party apps, including the concept of a family of client IDs (FOCI), where shared permissions and refresh tokens exist across related applications. This architectural nuance complicates mitigation but also offers potential defense pathways.
Mitigation Context and Defensive Considerations
- Token binding to trusted devices is discussed as a potential mitigation path, alongside behavioral detection rules and restrictions on app authentication.
- The discussion emphasizes that, while ConsentFix attacks are observed in campaigns, the v3 variant’s traction remains uncertain. The combination of trusted app trust frameworks and the automation layer adds an extra dimension to defense planning for administrators and security teams.
Impact Narrative and Forward LookConsentFix v3 represents a shift toward automation, emphasizing scalable phishing orchestration and real-time token harvesting. While the practical reach of v3 in active campaigns is not fully clear, the framework demonstrates how attackers could leverage serverless platforms and hosted phishing interfaces to streamline an OAuth abuse workflow. The blend of phishing sophistication, cloud-hosted infrastructure, and token-exchange automation underscores the evolving threat landscape around OAuth and first-party app trust.
Visual Aids and Illustrative Elements
- The campaign imagery often features phishing graphics and diagrams illustrating the flow from phishing lure to OAuth code capture to token exfiltration.
- Visuals commonly depict the Pipedream-based webhook receiving codes, automated code exchange, and token delivery to attackers’ control panels.
Contextual Notes on Source Material
- The ConsentFix v3 concept builds on prior disclosures that highlighted the role of OAuth flows and localhost redirections in credential theft, as well as the use of serverless platforms to automate attack steps.
- Discussion surrounding FOCl and first-party app trust frameworks adds a systems-level perspective to how these attacks can persist and what architectural choices influence risk.
Related Topics and Further Reading
- Device code phishing attacks and their rapid expansion in attacker toolkits
- Broader trends in phishing, OAuth abuse, and credential harvesting
- Forensic and incident response considerations in OAuth-based breaches
- The role of serverless platforms (e.g., Pipedream) in modern attack workflows
Image and Media Notes
- Visual references accompany reporting on ConsentFix, including diagrams of the attack sequence and depictions of phishing interfaces and data exfiltration pipelines.
- A representative image set includes captured workflow illustrations and screenshots of phishing architectures, intended to provide readers with a concrete mental model of the attack.
Closing OverviewConsentFix v3 epitomizes how threat actors are moving toward automation and scalability in OAuth abuse against Azure and Microsoft ecosystems. By weaving together phishing, impersonation, hosted phishing fronts, and real-time token exfiltration, attackers aim to minimize manual effort while maximizing reach. The ongoing evolution of such campaigns highlights the importance of robust token management, strict app authentication controls, and vigilant monitoring for anomalous OAuth activity within enterprise tenants. As organizations review their security postures, awareness of these patterns—especially the integration of serverless automation and first-party app trust dynamics—will be essential for maintaining resilient configurations and reducing exposure to OAuth-based threats.
Related Articles
- Device code phishing attacks surge 37x as new kits spread online
- FBI links cybercriminals to surge in cargo theft attacks
- New BlackFile extortion group linked to vishing campaigns
- FBI takedown of phishing service and developer arrest
- Manager of botnet linked to ransomware scheme sentenced to prison
Categories
- ConsentFix
- Cybercrime
- OAuth
- OAuth Tokens
- Phishing