A third iteration of the ConsentFix attack technique has been circulating on hacker forums, introducing automation and scalability to a method that abuses Microsoft Azure’s OAuth2 authorization code flow to hijack accounts without passwords and despite multi-factor authentication being enabled.
The original ConsentFix was documented by Push Security in December 2025 as an OAuth phishing technique that tricks victims into pasting a localhost URL containing an OAuth authorization code into an attacker-controlled page. A second version replaced the copy-paste step with drag-and-drop to make the flow more convincing. ConsentFix v3 retains the core OAuth abuse approach but adds an automated backend pipeline that scales the attack and removes manual steps from the token capture process.
The attack begins with automated verification of Azure presence in the target environment through valid tenant ID checks, followed by harvesting of employee names, roles, and email addresses for impersonation. Attackers create accounts across multiple services including Outlook, Tutanota, Cloudflare, DocSend, Hunter.io, and Pipedream to support phishing, hosting, data gathering, and exfiltration. Pipedream, a free serverless integration platform, serves as the webhook endpoint that receives the victim’s OAuth authorization code, the automation engine that immediately exchanges it for a refresh token via Microsoft’s API, and the central token collector available to the attacker in real time.
The phishing page is hosted on Cloudflare Pages and mimics a legitimate Microsoft or Azure interface. When a victim interacts with it, they are redirected to a localhost URL containing an OAuth authorization code, which they are tricked into pasting or dragging back into the page. Phishing emails are personalized using harvested employee data and embed malicious links inside PDFs hosted on DocSend to improve credibility and bypass spam filters. Captured tokens are imported into Specter Portal for post-exploitation access to email, files, and other Microsoft services. Push Security noted it is not yet clear whether the v3 variant has gained significant traction among active threat actors.
Organizations using Microsoft Azure and Microsoft 365 are the intended targets. The technique specifically abuses first-party Microsoft applications that are pre-trusted and pre-consented within Azure tenants, meaning standard app consent controls do not block the attack. Any organization with Azure presence and employees who can be phished through personalized email campaigns is within scope.
ConsentFix v3 bypasses MFA because it abuses a legitimate OAuth flow rather than stealing passwords. The victim completes a real Microsoft login, including any MFA challenge, and the attacker captures the resulting authorization code to obtain tokens. From the victim’s perspective, the interaction can appear entirely legitimate. Standard MFA deployment does not protect against this attack, and the automation in v3 means it can be run at scale against a targeted organization’s workforce simultaneously.
The use of entirely legitimate platforms, Cloudflare, DocSend, Pipedream, Outlook, for hosting and infrastructure also means network-level blocking of known malicious domains is not an effective defense.
Also in the news today:
The post ConsentFix v3 Automates OAuth Abuse to Bypass MFA and Hijack Azure Accounts appeared first on CISO Whisperer.
*** This is a Security Bloggers Network syndicated blog from CISO Whisperer authored by Evan Rowe. Read the original post at: https://cisowhisperer.com/consentfix-v3-automates-oauth-abuse-to-bypass-mfa-and-hijack-azure-accounts/?utm_source=rss&utm_medium=rss&utm_campaign=consentfix-v3-automates-oauth-abuse-to-bypass-mfa-and-hijack-azure-accounts