OAuth Phishing Campaign Mimics Spotify Using "Profit" Platform

OAuth Phishing Campaign Mimics Spotify Using "Profit" Platform

Cyber News - Erez Dasa reports on a new phishing campaign exploiting the β€œProfit” platform to impersonate Spotify. The emails originate from a β€œProfit” domain but direct users to a lookalike Spotify site. The goal is to trick users into granting third-party applications access to their official Spotify accounts via OAuth consent phishing. This attack vector leverages legitimate authorization flows to gain unauthorized access.

This technique, OAuth consent phishing, is particularly insidious because it bypasses traditional credential checks. Users are not entering their passwords directly on a fake site; they are authorizing an application. Defenders must be vigilant about unexpected OAuth consent requests, even if they appear to originate from trusted services. Educating users on scrutinizing OAuth scopes and the legitimacy of the requesting application is paramount. The indicator provided, hxxps://premium-sp[.]co, highlights how attackers craft convincing, yet fraudulent, URLs.

Organizations should review their OAuth application access policies and educate users on the risks of granting broad permissions. Regularly auditing connected applications for user accounts can help identify and revoke unauthorized access. For security teams, monitoring for unusual OAuth consent requests originating from unexpected sources or domains is a critical detection point.

What This Means For You

  • If your users have Spotify accounts, instruct them to immediately review all connected third-party applications for unauthorized access and revoke any suspicious entries. Audit your identity provider for unusual OAuth consent grants, especially those that don't align with standard business operations.
Take action on this incident
πŸ“‘ Monitor spotify.com Free Β· 1 watchlist slot Β· instant alerts on new breaches πŸ” Threat intel on Spotify All breaches, IOCs & vendor exposure

Related coverage on Spotify

Microsoft 365 Organizations Hit by EvilTokens Phishing-as-a-Service

A new phishing-as-a-service (PhaaS) platform, EvilTokens, emerged in February 2026, rapidly compromising over 340 Microsoft 365 organizations across five countries within its first five weeks,...

threat-intelvulnerabilitymicrosoftidentityphishing
/SCW Vulnerability Desk /MEDIUM

Microsoft Warns of Russian Wiper Malware Targeting Israel, Iran

Microsoft's Threat Intelligence division has identified a Russian-attributed wiper malware designed to erase data on infected Linux systems. According to Cyber News - Erez Dasa,...

israeldata-breachidentitythreat-intel
/SCW Threat Desk /MEDIUM

Quasar Linux RAT Targets Developers for Supply Chain Compromise

A previously undocumented Linux implant, codenamed Quasar Linux RAT (QLNX), is actively targeting developer systems. The Hacker News reports that QLNX establishes a persistent foothold...

threat-intelvulnerabilityidentityphishingthe-hacker-news
/SCW Vulnerability Desk /MEDIUM /⚑ 5 IOCs