hlk_logo

"Moving to E5 has been really good from a security point of view... Now we can get a holistic view of what’s going on, which helps us to make changes and recommendations for future plans."

IT Service Manager
Ian Harkess
Trusted by industry leaders
NHS Confederation Logo

Kickstart Your FastTrack Journey

Fill out the short form below to express your interest in our FastTrack programme, and we’ll be in touch soon.

Please note: A minimum of 150 enterprise licenses is required for FastTrack eligibility.

“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders

Let's Talk

Call us on one of the numbers below, we cover the whole of the UK, so call the nearest office.

BriSTOL HQ & The South West

London & Surrounding Areas

Manchester & the North

Keep up to date with the experts

Get insights directly to your email inbox

MAIL LIST - Newsletter, Exit Intent Popup (#13)

Follow us on social

“We needed to find solutions to a variety of issues whilst being a complex business, operating in a 24/7 environment. Stripe OLT listened and understood immediately the challenges we faced.”

IT Operations Manager
Simon Darley
Trusted by industry leaders
NHS Confederation Logo White

Request a Call

First we need a few details.

ENQUIRY - Popup w/ Captcha for light backgrounds (#21)
Expert Intel

When Authentication Isn’t Enough – Understanding OAuth Token Abuse

Published: May 13, 2026

Klementina Minga's profile picture

Expert: Klementina Minga

Role: SOC Analayst

Specialises in: Security Operations

What you will learn:
This report provides a detailed analysis of OAuth token abuse, focusing on how threat actors bypass defensive security measures to gain unauthorised access.
“Security is gold, but tokens are bold, your session is sold before it gets old.”

As organisations continue to accelerate cloud adoption and embrace SaaS-driven ecosystems, identity and access management has become one of the most critical pillars of modern cyber security. However, while businesses invest heavily in strengthening authentication controls such as Multi-Factor Authentication (MFA), attackers are increasingly shifting tactics to exploit the trust mechanisms that exist beyond passwords – this is where OAuth token abuse comes in…


So, what exactly is OAuth token abuse?

OAuth allows third-party applications access to cloud app resources such as Outlook files without the requirement of a password, using tokens as an authorisation method. OAuth token abuse occurs when threat actors bypass credentials entirely, either by stealing a valid session token or tricking a user into granting permission to a malicious “shadow” application.
This matters because OAuth removes the need for passwords, but in doing so shifts trust to tokens and application permissions. When abused, this allows attackers to bypass traditional controls such as MFA and conditional access entirely.

While OAuth was designed to improve usability and streamline secure access between applications, the same convenience can create opportunities for abuse when permissions are granted too broadly or monitored too loosely. Because many of these actions appear legitimate from the perspective of the identity provider, traditional detection methods may struggle to identify malicious behaviour early.

How does it work?

OAuth token abuse typically falls into three attack paths:

  1. Token Theft – When a threat actor steals an OAuth token used to access APIs and other services, without the requirement to re-authenticate.
  2. Session Hijacking – This involves taking over an active session or tricking a user into authorising a malicious app. Attackers create fake apps (e.g. “Meeting Notes AI”) with legitimate-looking consent screens. When a user clicks “Accept”, the identity provider issues a valid token directly to the attacker.
  3. Device Code Phishing – Attackers use the “Device Flow” to trick users into authorising an attacker’s device. This is particularly dangerous because it often bypasses conditional access policies that require “Managed Devices”.
Caption: Example attack flow showing how malicious OAuth apps mimic legitimate services, making it difficult for users to distinguish safe from unsafe permissions.

The effectiveness of these techniques lies in the fact that attackers are abusing trusted processes rather than exploiting software vulnerabilities directly. In many cases, organisations may unknowingly approve malicious applications or overlook dormant third-party integrations that retain excessive permissions long after implementation.

Real World Incidents

Real-world breaches over the past year demonstrate how OAuth token abuse is no longer a theoretical risk, but an increasingly active attack vector affecting major organisations and SaaS providers globally. Two notable breaches include:

  • Obsidian Security identified a large-scale SaaS breach campaign in 2025 impacting over 700 organisations, including platforms such as Salesforce and Gmail, driven by OAuth token abuse.
  • As reported by Trend Micro, OAuth token abuse contributed to the Vercel Breach. A compromised third-party OAuth app (Context.ai) allowed attackers to pivot into Vercel’s internal systems and bypass traditional security controls. This demonstrated how a single “non-human” trust relationship can expose sensitive data.

Mitigation strategies against OAuth token abuse

Reducing the risk of OAuth token abuse requires organisations to rethink how application trust and delegated access are governed across their environments. Security teams should focus not only on user authentication, but also on continuous visibility and control over application permissions.

  1. Restrict Third-Party Apps – Disable the ability for users to grant permissions to unverified applications. Implement a secure and protected workflow for all new OAuth integrations.
  2. Shorten Token Lifespans – Use refresh token rotation and enforce shorter expiration times to reduce the window of opportunity for a stolen token.
  3. Continuous Inventory – Regularly audit all SaaS-to-SaaS integrations and “shadow AI” tools to ensure no legacy apps still have high-privilege access to your data.
  4. Enforce Phishing-Resistant MFA – Shift to FIDO2/WebAuthN or hardware security keys. Unlike traditional “push” notifications, these methods use cryptographic signatures that cannot be intercepted or replayed by attackers.

OAuth token abuse highlights a broader shift in identity-based attacks – where trust is no longer tied to credentials, but to permissions that are often less visible and less controlled.


If you would like to understand how OAuth token abuse could impact your environment or review your current identity controls, you can speak to our team.

Our latest expert Intel

  • May 13, 2026
    Read full article
  • May 1, 2026
    Read full article
  • April 14, 2026
    Read full article
  • April 10, 2026
    Read full article
  • April 2, 2026
    Read full article
  • Cyber Background
    March 24, 2026
    Read full article
  • notepad compromise
    April 1, 2026
    Read full article
  • M365
    February 3, 2026
    Read full article
  • Person using a laptop with the Google search homepage open
    February 3, 2026
    Read full article
  • January 20, 2026
    Read full article
  • A professional man holds a "Stripe OLT" branded coffee mug in a modern office environment.
    October 27, 2025
    Read full article
  • October 9, 2025
    Read full article