Hybrid cloud campaign OiVaVoii targets company executives

A new hacking campaign, tracked as ‘OiVaVoii’, is targeting company executives with malicious OAuth apps.

Researchers from Proofpoint have uncovered a new campaign named ‘OiVaVoii’ that is targeting company executives, former board members, Presidents and managers with bogus OAuth apps and cleverly-crafted lures sent from compromised Office 365 accounts.

Microsoft has blocked many of the apps, but according to the researchers, the campaign is still ongoing. Once the attackers have compromised the executive accounts, they can carry out a broad range of malicious activities, from insider phishing to human-operated ransomware attacks.

The researchers uncovered five malicious OAuth applications employed in this campaign, some of them created by a “verified” organization (‘Yuma Counseling Services’).

App nameApp idPublished TypeCreation DateStatusUpgrade01d33e0a-83c1-4e5c-98be-096bc270eabfVerified16/11/21BlockedUpgradef9b75e84-5235-48d3-b745-37c99c056b64Verified23/1/22BlockedDocumentc517e6b9-a1d5-4f7e-8081-dfb2142c056aVerified26/1/22BlockedSharedb2710450-6cec-4e4f-989f-c16f3041620aUnverified27/1/22 AvailableUserInfo32fc064d-d4ea-43f9-ae7f-e90da936053fUnknown27/1/22Blocked

At least three of the rogue third-party apps were created by two different “verified publishers,”a circumstance that suggests the attackers have compromised admin user-account within a legitimate Office tenant.

“Once these apps were created, authorization requests were then sent, via email, to numerous targeted users, including high-level executives. The seemingly benign identity of the publishing organization was a substantial advantage, causing multiple unsuspecting victims to authorize these applications. ” reads the analysis published by Proofpoint. “This enables the attackers to generate OAuth tokens on the compromised user’s behalf and complete the account takeover.”

The threat actors used the apps to send out authorization requests to the victims and upon accepting them, threat actors could use the token to send emails from their accounts to other employees within the same organization

In order to prevent victims from canceling the request by clicking “Cancel”, attackers manipulate the Reply URL to redirect back to the consent screen autonomously.

“apps potentially use MITM proxy attacks. This means that credential theft could take place as part of the attack flow, greatly increasing the risk of a complete account takeover and prolonged persistency.” continues the report.

Experts pointed out that all the detected apps requested similar permissions, mainly related to mailbox access (read & write).

“As we monitor the threat, we expect to see new apps being created and proliferated.” concludes ProofPoint. “Therefore, we advise taking immediate prevention measures, such as limiting app authorization by users’ and using layered defense solutions for early detection and remediation. In case of confirmed impact, we advise immediate revocation and deletion of malicious apps, along with suspicious mailbox rules, hosted files, and messages.”

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(SecurityAffairs – hacking, OiVaVoii campaign)

The post Hybrid cloud campaign OiVaVoii targets company executives appeared first on Security Affairs.

Recent Posts
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt