tr-23-355-003 (1)

12336864900?profile=RESIZE_400xMicrosoft representatives have warned that adversaries use OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing attacks.  "Threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can misuse to hide malicious activity," the Microsoft Threat Intelligence team said in an analysis.  The misuse of OAuth also enables threat actors to maintain access to applications even if the