Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Spotify’s new feature makes it easier to find popular audiobooks

    This portable JBL Grip Bluetooth speaker is so good at 20% off

    ‘AI’ could dox your anonymous posts

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Weighing up the enterprise risks of neocloud providers

      March 3, 2026

      A stolen Gemini API key turned a $180 bill into $82,000 in two days

      March 3, 2026

      These ultra-budget laptops “include” 1.2TB storage, but most of it is OneDrive trial space

      March 1, 2026

      FCC approves the merger of cable giants Cox and Charter

      February 28, 2026

      Finding value with AI and Industry 5.0 transformation

      February 28, 2026
    • Crypto

      Strait of Hormuz Shutdown Shakes Asian Energy Markets

      March 3, 2026

      Wall Street’s Inflation Alarm From Iran — What It Means for Crypto

      March 3, 2026

      Ethereum Price Prediction: What To Expect From ETH In March 2026

      March 3, 2026

      Was Bitcoin Hijacked? How Institutional Interests Shaped Its Narrative Since 2015

      March 3, 2026

      XRP Whales Now Hold 83.7% of All Supply – What’s Next For Price?

      March 3, 2026
    • Technology

      Spotify’s new feature makes it easier to find popular audiobooks

      March 3, 2026

      This portable JBL Grip Bluetooth speaker is so good at 20% off

      March 3, 2026

      ‘AI’ could dox your anonymous posts

      March 3, 2026

      Microsoft says new Teams location feature isn’t for ’employee tracking’

      March 3, 2026

      OpenAI got ‘sloppy’ about the wrong thing

      March 3, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»New CoPhish attack steals OAuth tokens via Copilot Studio agents
    Technology

    New CoPhish attack steals OAuth tokens via Copilot Studio agents

    TechAiVerseBy TechAiVerseOctober 26, 2025No Comments5 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    New CoPhish attack steals OAuth tokens via Copilot Studio agents
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    New CoPhish attack steals OAuth tokens via Copilot Studio agents

    A new phishing technique dubbed ‘CoPhish’ weaponizes Microsoft Copilot Studio agents to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains.

    The technique was developed by researchers at Datadog Security Labs, who warned in a report earlier this week that Copilot Studio’s flexibility introduces new, undocumented phishing risks.

    Although CoPhish relies on social engineering, Microsoft has confirmed to BleepingComputer that it plans on fixing the underlying causes in a future update.

    “We’ve investigated this report and are taking action to address it through future product updates,” a Microsoft spokesperson told BleepingComputer.

    “While this technique relies on social engineering, we remain committed to hardening our governance and consent experiences and are evaluating additional safeguards to help organizations prevent misuse.”

    Copilot agents and OAuth phishing

    Copilot Studio agents are chatbots hosted on copilotstudio.microsoft.com that users can create and customize through “topics,” which are workflows that automate specific tasks.

    Agents can be shared on Microsoft’s domain by enabling the “demo website” feature. Because the URL is a legitimate one, it is easier for a user to fall for the trick and log in.

    The Login topic, which authenticates the user when starting a conversation with the chatbot, can be configured for specific actions, like requesting a verification code or redirecting to another location or service.

    Customizable sign-in topic in malicious agent
    source: Datadog

    Katie Knowles, senior security researcher at Datadog, says that an attacker can customize the Login button with a malicious application that can be “either internal or external to the target environment,” and could target an application admin even they don have access to the environment.

    Targeting an unprivileged user in the tenant is currently possible if the threat actor is already present in the environment. However, when Microsoft’s default policy changes, the attack would be limited only to OneNote read/write permissions and close the gap for email, chat, and calendar services.

    Knowles says that even after Microsoft’s update, it is still possible for an external attacker to “target an Application Administrator with an externally registered application,” because the changes do not apply to high-privileged roles.

    Users with administrator privileges in the tenant can approve permissions requested by internal or external applications, even if they are not verified (e.g. are marked as not being published by Microsoft or their organization).

    The Datadog researcher says that a CoPhish attack starts with the threat actor creating a malicious multi-tenant app with the sign-in topic configured to direct to the authentication provider and to collect the session token.

    Getting the session token is possible by configuring an HTTP request to a Burp Collaborator URL and deliver the access token variable in a “token” header.

    Adding the required actions to the sign-in topic
    Source: Datadog

    “The application ID (or client ID), secret, and authentication provider URLs are used to configure the agent’s sign-in settings,” Knowles says in a report this week.

    It should be noted that the redirect action when the victim user clicks on the Login button can be configured to redirect to any malicious URL, and the application consent workflow URL is just one possibility for the attacker.

    CoPhish attack on Admins

    After activating the malicious agent’s demo website, an attacker can distribute it to targets in email phishing campaigns or over Team messages.

    Since the URL is legitimate and the design of the page, users may think that it is just another Microsoft Copilot service. Knowles says that one clue that could raise suspicions is the “Microsoft Power Platform” icon, which is easy to miss.

    The Microsoft-hosted page and Login button
    Source: Datadog

    An admin falling for the trick and accepting the malicious app’s permisssions, are taken to the OAuth redirect URL [token.botframework.com] to validate the bot connection.

    “This may seem atypical, but it’s a standard part of the Copilot Studio authentication process using a valid domain,” the Datadog researchers says.

    After completing the authentication process, the user will receive no notification about their session token being forwarded to Burp Collaborator and their session being hijacked, but they will be able to chat with the agent.

    Furthermore, because the token was sent from Copilot using Microsoft’s IP addresses, the connection to the attacker will not show in the user’s web traffic.

    Below is a visual overview of how the CoPhish attack works and the steps from the victim user accessing the malicious app to the attacker receiving the token.

    Cophish attack flow diagram
    Source: Datadog

    Microsoft told BleepingComputer that customers can protect against CoPhish attacks by limiting administrative privileges, reducing application permissions, and enforcing governance policies.

    Datadog provides a set of security considerations that include implementing a strong application consent policy that would cover any gaps in Microsoft’s default baseline configuration.

    The cloud monitoring and security company also advises organizations to disable user application creation defaults, and closely monitor application consent via Entra ID and Copilot Studio agent creation events.


    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleMozilla: New Firefox extensions must disclose data collection practices
    Next Article BBC study finds AI chatbots still get news wrong 45% of the time
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Spotify’s new feature makes it easier to find popular audiobooks

    March 3, 2026

    This portable JBL Grip Bluetooth speaker is so good at 20% off

    March 3, 2026

    ‘AI’ could dox your anonymous posts

    March 3, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025703 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025285 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025164 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025124 Views
    Don't Miss
    Technology March 3, 2026

    Spotify’s new feature makes it easier to find popular audiobooks

    Spotify’s new feature makes it easier to find popular audiobooks Image: Spotify Summary created by…

    This portable JBL Grip Bluetooth speaker is so good at 20% off

    ‘AI’ could dox your anonymous posts

    Microsoft says new Teams location feature isn’t for ’employee tracking’

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Spotify’s new feature makes it easier to find popular audiobooks

    March 3, 20262 Views

    This portable JBL Grip Bluetooth speaker is so good at 20% off

    March 3, 20262 Views

    ‘AI’ could dox your anonymous posts

    March 3, 20261 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    Best TV Antenna of 2025

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.