March 9, 2026
By esentry Team

OAuth Redirect Abuse Delivering Malware

OAuth is a widely used internet technology that allows apps and websites to let you log in using accounts you already have like Google or Microsoft. If you’ve ever clicked “Sign in with Google” or “Continue with Microsoft,” you’ve already used OAuth.

Instead of creating a new username and password for every website, OAuth acts as a secure middleman. It verifies your identity through a trusted provider (like Google or Microsoft) and then safely confirms to the other app that you are who you say you are without sharing your actual password.

OAuth is an open standard for access delegation, meaning it allows third-party applications to access certain information from your account without giving them full control or your login credentials.

For example, when you click “Sign in with Microsoft,” OAuth sends you to Microsoft to confirm your identity. Once verified, Microsoft redirects you back to the app and tells it that you’re authenticated allowing you to log in instantly.

What is OAuth Redirect Abuse?

Imagine receiving an email that looks completely legitimate. It might mention a document waiting for your signature, a Microsoft Teams meeting invite, a password reset, or another important account notification. Everything about the message seems normal, so you click the link.

The link takes you to what looks like a standard Microsoft or Google login page. And that’s because it actually is the real page nothing fake about it. But behind the scenes, something different is happening.

Hidden inside the link is a trick. After the login step, instead of taking you back to the app you expected, the process quietly redirects you to another website controlled by attackers. From there, you might land on a convincing phishing page designed to steal your login details, or malware could begin downloading onto your device.

Attackers pull this off by manipulating the login link itself. They alter part of the address that tells the system where to send the user after authentication. Instead of returning you to a legitimate application, the system sends you to a malicious destination. Because the process starts on a trusted domain like Microsoft or Google, many users and even some security filters — assume the link is safe.

What makes this technique particularly deceptive is that no software bug is being exploited. The attackers are simply abusing a normal feature of OAuth, the technology that handles “Sign in with Microsoft” or “Sign in with Google.” By manipulating the redirect process, they turn a trusted login flow into a pathway for phishing and malware delivery.

The Abuse: When a Trusted Login Becomes the Trap

The attack typically follows these steps:

  1. Phishing email is sent
    The victim receives an email pretending to be something legitimate such as:
    • A document to review
    • A password reset request
    • A Teams meeting recording
    • An employee report or notification.
  2. Victim clicks a link using a trusted domain: The link appears safe because it may use legitimate domains like Microsoft login services.
  3. OAuth redirect is triggered: Attackers intentionally cause an OAuth error or redirect event.
  4. User is redirected to a malicious site :The victim is sent to an attacker-controlled site where malware files are hosted.
  5. Malware infection begins : Victims may download files such as ZIP archives containing malicious scripts or loaders that execute commands on the system.

Why This Attack Is Dangerous

What makes this technique particularly tricky is that nothing is technically “hacked.”

There is no broken software or vulnerability being exploited. Instead, attackers are simply misusing normal OAuth login behaviour to trick users and bypass many traditional phishing defences. They use trusted login pages to guide victims straight into malicious territory.

It relies on legitimate login pages, allowing the attack to slip past some security filters while taking advantage of users’ trust in familiar platforms.

Possible Security Implications

If successful, this attack can lead to serious consequences:

  • Malware infection on endpoints
  • Remote control of compromised devices
  • Data theft and surveillance
  • Network infiltration in organizations
  • Further phishing or ransomware attacks

Recommendations

For Organizations

  • Strengthen Email Security: Implement advanced phishing detection and monitor suspicious OAuth links in emails.
  • Monitor OAuth Application Activity: Review newly created OAuth apps. Audit application permissions regularly.
  • Enforce Security Policies: Use conditional access policies. Restrict unverified third-party OAuth applications.
  • Implement Endpoint Protection: Deploy modern endpoint detection and response (EDR). Monitor suspicious script execution.
  • Train Employees: User awareness training is critical since these attacks rely heavily on social engineering.

For Individual Users

  • Be cautious of unexpected emails requesting document reviews or password resets.
  • Do not blindly trust links just because they use legitimate login domains.
  • Avoid downloading files from unfamiliar sources.
  • Verify requests through official channels before clicking links.
  • Use updated antivirus and system patches.