15.2 Incident Briefing: INC-2026-0325-004
Incident Briefing: INC-2026-0325-004
The alert
At 10:15 UTC on 25 March 2026, a Defender for Cloud Apps alert fires: Unusual OAuth application consent — high-risk permissions granted by multiple users. 12 Northgate Engineering users consented to an application called “Microsoft Security Update Tool” within a 4-hour window. The application requested: Mail.ReadWrite, Files.ReadWrite.All, and Contacts.Read.
What you know at this point
The application name “Microsoft Security Update Tool” is designed to look like a legitimate Microsoft application. It is not — Microsoft does not distribute security tools via OAuth consent prompts.
12 users consented between 06:00 and 10:00 UTC. The consent events originated from a phishing email sent at 05:45 containing a link that triggered the OAuth consent prompt. The email subject: “Mandatory Security Update Required — Action Needed Today.”
The application is registered in an external tenant (not Northgate’s tenant). The publisher is unverified. The application’s AppId does not appear in Microsoft’s known first-party application list.
What you do NOT know: Whether the application has already accessed the users’ data. How much data has been exfiltrated. Whether additional applications were consented.
Investigation priority: Determine what permissions were granted, whether the application has used those permissions to access data, and revoke the consent before more data is exfiltrated. Unlike BEC (where financial recovery drives urgency), consent phishing urgency is driven by data exposure — every hour the application retains access is an hour of data exfiltration.
Analysing the phishing email
Before investigating the OAuth consent itself, trace how users were directed to the consent prompt:
| |
What to examine: The phishing email directs users to a URL that triggers the Microsoft consent prompt. The URL format is: https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=[MALICIOUS-APP-ID]&scope=Mail.ReadWrite+Files.ReadWrite.All+Contacts.Read&response_type=code&redirect_uri=[ATTACKER-URL]. The consent prompt is a real Microsoft page — the user sees the Microsoft logo and the permission list. This is why consent phishing is effective: the user is interacting with a legitimate Microsoft authentication flow, not a fake login page.
Extract the URL from the email:
| |
From the URL, extract: The client_id parameter (the malicious application’s AppId — use this throughout the investigation), the scope parameter (the permissions requested), and the redirect_uri (where the authorisation code is sent — the attacker’s infrastructure).
Initial scoping
Determine the full scope before deep-diving:
| |
If this returns multiple application names: the attacker registered multiple malicious applications — possibly with different permission sets targeting different user groups. Each application must be investigated and revoked separately.
In credential phishing (Module 12), the attacker needs the stolen token to access data — revoke the token and access stops. In consent phishing, the application has its own identity and its own tokens. Revoking the user's tokens does not affect the application. The only way to stop the application is to revoke the consent or delete the enterprise application. Until you do that, the application continues accessing every consenting user's data — automatically, 24/7, with no human interaction required.
Knowledge check
Assessing the phishing campaign delivery
Before investigating the application, determine how users were directed to the consent prompt.
| |
What to examine: The sender domain (is it spoofed or a lookalike?), the subject line (urgency language typical of consent phishing), and the delivery verdict (did email protection flag it?). Cross-reference: did the same sender email non-consenting users? Those users received the phishing email but did not click — they may report it, providing additional investigation evidence.
Phishing email characteristics for consent phishing: Unlike credential phishing (which directs to a fake login page), consent phishing directs to a real Microsoft consent prompt. The URL in the email points to login.microsoftonline.com/common/oauth2/v2.0/authorize?... — a legitimate Microsoft URL. This is why URL-based detection is ineffective: the URL is genuine. The malicious element is the application the URL requests consent for, not the URL itself.
Try it yourself
Search your EmailEvents for emails containing "oauth2/authorize" or "consent" in the last 30 days. How many legitimate consent-related emails does your organisation receive? Understanding the baseline volume helps calibrate: if your organisation normally receives 0 consent-related emails per week, a sudden cluster of 12 is an obvious anomaly. If IT regularly sends OAuth enrollment emails, the signal is noisier.
What you should observe
Most organisations see very few consent-related emails — the consent prompt is typically triggered by clicking a link in an application, not by email. Any email explicitly directing users to a consent prompt should be investigated.
Check your understanding
1. 12 users consented to the same application in 4 hours. What does this indicate?