Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.
Iran-linked Dust Specter targeted Iraqi officials using fake ministry lures and new malware families uncovered by Zscaler.
Microsoft reveals ClickFix campaign abusing Windows Terminal to deliver Lumma Stealer and steal browser credentials.
Microsoft uncovers OAuth phishing campaigns that abuse login redirects to deliver malware and steal credentials.
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take ...
Crims hope for payday from malicious payloads rather than stealing access tokens Microsoft has warned organizations about ...
A compromised Chrome extension with 7,000 users was updated to deploy malware, strip security headers, and steal cryptocurrency wallet seed phrases.
Microsoft has identified a phishing campaign using malformed links to legitimate OAuth services to redirect to malware ...
An OAuth feature is being abused in the wild to drop malware to people's computers.
IntroductionIn January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq. ThreatLabz discovered previously undocumented malware ...
In ClickFix attacks, victims are supposed to execute commands themselves to infect their systems. One campaign relies on Windows Terminal.
The post Microsoft Flags Malware Delivery Tied to OAuth Login Phishing Campaign appeared first on Android Headlines.