OAuth Phishing Campaign Mimics Spotify Using "Profit" Platform
Cyber News - Erez Dasa reports on a new phishing campaign exploiting the βProfitβ platform to impersonate Spotify. The emails originate from a βProfitβ domain but direct users to a lookalike Spotify site. The goal is to trick users into granting third-party applications access to their official Spotify accounts via OAuth consent phishing. This attack vector leverages legitimate authorization flows to gain unauthorized access.
This technique, OAuth consent phishing, is particularly insidious because it bypasses traditional credential checks. Users are not entering their passwords directly on a fake site; they are authorizing an application. Defenders must be vigilant about unexpected OAuth consent requests, even if they appear to originate from trusted services. Educating users on scrutinizing OAuth scopes and the legitimacy of the requesting application is paramount. The indicator provided, hxxps://premium-sp[.]co, highlights how attackers craft convincing, yet fraudulent, URLs.
Organizations should review their OAuth application access policies and educate users on the risks of granting broad permissions. Regularly auditing connected applications for user accounts can help identify and revoke unauthorized access. For security teams, monitoring for unusual OAuth consent requests originating from unexpected sources or domains is a critical detection point.
What This Means For You
- If your users have Spotify accounts, instruct them to immediately review all connected third-party applications for unauthorized access and revoke any suspicious entries. Audit your identity provider for unusual OAuth consent grants, especially those that don't align with standard business operations.