HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

ConsentFix v3 Automates OAuth Phishing to Hijack Azure Tokens, Bypassing MFA

A new automated attack, ConsentFix v3, leverages the OAuth authorization‑code flow to steal Azure AD tokens without passwords, even when MFA is enabled. The technique uses Pipedream automation and Cloudflare Pages to scale phishing campaigns, posing a high risk to organizations relying on Azure for identity and access management.

LiveThreat™ Intelligence · 📅 May 02, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

ConsentFix v3 Automates OAuth Phishing to Hijack Azure Tokens, Bypassing MFA

What Happened — A new automated attack chain called ConsentFix v3 is being sold on hacker forums. It abuses the OAuth 2.0 authorization‑code flow to steal Azure AD access and refresh tokens, even when multi‑factor authentication (MFA) is enabled. The workflow is fully automated via Pipedream webhooks, Cloudflare Pages phishing sites, and disposable email accounts.

Why It Matters for TPRM

  • Enables large‑scale credential theft from Azure tenants, compromising any downstream SaaS or cloud service that trusts Azure AD.
  • Bypasses MFA, a control many third‑party risk assessments treat as a baseline defense.
  • Automation lowers the barrier for opportunistic attackers, increasing the likelihood of widespread exposure.

Who Is Affected — Enterprises and MSPs that rely on Azure AD for identity, SaaS vendors built on Azure, and any third‑party that consumes Azure‑issued tokens.

Recommended Actions — Review and tighten Azure AD conditional‑access policies, restrict OAuth consent to vetted applications, monitor for abnormal token issuance, disable legacy OAuth grant types, and run phishing‑simulation training focused on OAuth‑based lures.

Technical Notes — Attack vector: phishing (malicious OAuth login page) combined with automation (Pipedream webhook that instantly exchanges captured authorization codes for refresh tokens). No public CVE; the abuse leverages legitimate Microsoft APIs. Compromised data includes access/refresh tokens that grant full account control. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/consentfix-v3-attacks-target-azure-with-automated-oauth-abuse/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.