Suspicious Office 365 app authorization (OAuth) link

Message contains a suspicious Office 365 app authorization (OAuth) link. The app may be compromised or was stood up for malicious purposes. Once the app has been authorized, the attacker will have read or write permissions to the user's Office 365 account.

Sublime rule (View on GitHub)

 1name: "Suspicious Office 365 app authorization (OAuth) link"
 2description: |
 3  Message contains a suspicious Office 365 app authorization (OAuth) link. The app may be compromised or 
 4  was stood up for malicious purposes. Once the app has been authorized, the attacker will have 
 5  read or write permissions to the user's Office 365 account.  
 6references:
 7  - "https://info.phishlabs.com/blog/office-365-phishing-uses-malicious-app-persist-password-reset"
 8type: "rule"
 9severity: "high"
10source: |
11  type.inbound
12  and any(body.links,
13          .href_url.domain.domain == 'login.microsoftonline.com'
14          and strings.ilike(.href_url.query_params, '*offline_access*', '*.readwrite*', '*.read*')
15  )  
16attack_types:
17  - "Credential Phishing"
18detection_methods:
19  - "URL analysis"
20id: "13a8c430-3e62-5c8f-86b5-3722599bead4"
to-top