heroui logo

Suspicious Office 365 app authorization (OAuth) link

Sublime Rules

View Source
Summary
This rule is designed to detect suspicious Office 365 app authorization links related to OAuth, which could indicate a potential phishing attempt. The link under scrutiny likely leads users to authorize third-party applications that could access their Office 365 accounts. Once authorized, such apps can gain extensive permissions, including the ability to read and write data, posing a significant security threat. The detection logic specifically checks for links directing to 'login.microsoftonline.com' with certain query parameters indicative of risky behaviors, like requests for offline access or app permissions. Anomalies or signs of manipulation in the link structure and parameters are flags for potential malicious intent. This can protect users from threats associated with credential phishing attempts by highlighting suspicious app authorization links that are potentially compromised or malicious.
Categories
  • Cloud
  • Identity Management
  • Web
Data Sources
  • Web Credential
Created: 2021-02-19