Consent Phishing and the Allure of Azure

Read the Case Study

CASE STUDY

Mock up of case study
Blackpoint Cyber logo

It’s the phishing attack that skips credential theft and malware installation, evades endpoint security, and bypasses MFA. What’s more, threat actors are increasingly using these attacks to hack into companies’ Microsoft 365 and Azure environments. This case study walks through a typical consent phishing attack and explains what MSPs and their customers need to know about protection.

Blackpoint Cyber logo

FOLLOW US

© 2023 Blackpoint Cyber. All rights reserved.

Learn: 

  • Why threat actors are turning to these attacks
  • How an attack happens, and why it doesn’t rely on stealing credentials
  • How Blackpoint stops consent phishing attacks, enabling you to protect your customers against malicious app approvals made via Azure SSO

How Attackers are Breaching Cloud Environments by Duping Users into Approving Malicious Apps