{"id":811,"date":"2026-05-05T13:16:03","date_gmt":"2026-05-05T13:16:03","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=811"},"modified":"2026-05-05T13:16:03","modified_gmt":"2026-05-05T13:16:03","slug":"the-back-door-attackers-know-about-and-most-security-teams-still-havent-closed","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=811","title":{"rendered":"The Back Door Attackers Know About \u2014 and Most Security Teams Still Haven\u2019t Closed"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhMhaEkMCxALglRWDFwTHVYgZ0KrRmAuzdwfh0zbL5Ml163rakQSv8yRVQ8yTQ4xIAtcwdqvGyVXeZXgXGNYKoyStckJv2xzjH3f1O7oICND5cWbnIBGYkSVJbpDRYHH9XqNfFQNk1qWIVwd43UuJv2vozhpndzCMS789h026IKgX1t7pgp01AtI6i9wKE\/s1700-e365\/material.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic cleanup, and in most organizations, no one watching it. Your perimeter controls don&#8217;t see it. Your MFA doesn&#8217;t stop it. And when an attacker gets hold of one, they don&#8217;t need a password.<\/p>\n<p>OAuth grants don&#8217;t expire when employees leave. They don&#8217;t reset when passwords change. And in most organizations, nobody is watching them.<\/p>\n<p>The model made sense when a handful of IT-approved apps needed calendar access. It doesn&#8217;t hold up when every employee is independently wiring AI tools, workflow automations, and productivity apps directly into their Google or Microsoft environment \u2014 each one receiving a persistent, scoped token with no automatic expiration and no centralized visibility.<\/p>\n<p>That&#8217;s not a misconfiguration. It&#8217;s how OAuth is designed to work. The gap is that most security programs weren&#8217;t built to account for it at scale.<\/p>\n<h2>CISOs know it&#8217;s a problem. Most aren&#8217;t solving it.<\/h2>\n<p><a href=\"https:\/\/material.security\/resources\/automating-oauth-grant-management-materials-research-shows-the-growing-gap-between-awareness-and-action?utm_source=third-party&amp;utm_medium=blog&amp;utm_campaign=20260505-the-hacker-news\">New research from Material Security<\/a> quantifies the gap between awareness and action. 80% of security leaders consider unmanaged OAuth grants a critical or significant risk. Most have said as much for years.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhsTygaceWrxyWhXfbcDkmZV9JeY4kSvXnGbuNlNtMqxU9w_p4WgNXOoy2wJ2YizDvkUOkbwAlw_Lywl_dKme8ZfxFGg7ebcB0WJbUgGgTmFB_zWBRzlhZtPWFwg_m5yfq-JENhTwGWV5m0IoWB8OvcdqwEKOWMRWyWvYDwiSUU5DeB29KIl_Iq5PkEf_8\/s1700-e365\/fig1.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhsTygaceWrxyWhXfbcDkmZV9JeY4kSvXnGbuNlNtMqxU9w_p4WgNXOoy2wJ2YizDvkUOkbwAlw_Lywl_dKme8ZfxFGg7ebcB0WJbUgGgTmFB_zWBRzlhZtPWFwg_m5yfq-JENhTwGWV5m0IoWB8OvcdqwEKOWMRWyWvYDwiSUU5DeB29KIl_Iq5PkEf_8\/s1700-e365\/fig1.png\" alt=\"\" border=\"0\" data-original-height=\"2400\" data-original-width=\"3840\"\/><\/a><\/div>\n<p>But awareness doesn&#8217;t translate directly into capability.\u00a0 A substantial portion of organizations (45%) are doing nothing to monitor OAuth grants at scale. Many of the rest (33%) are running manual processes \u2014 tracking grants in spreadsheets, reviewing permissions on an ad hoc basis, relying on employees to flag unusual app behavior.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj3OO8pv_ZKMiVIdT3Y62U8v9wOjV4rgRcxjofWLosXeRDVDVnYS7iZMNDGVPHDEAVCqblnAuGkI0tP_Svk3H0AuG1c534ItZP3HfElLdnAABGiRNRvn4dpQiumE_wQ-cAnij6xVRHgvBLJ_QWIgM49-vGnDfQzMG8xuoFo1M1mEItg527bzDIx1sSEm8I\/s1700-e365\/fig2.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj3OO8pv_ZKMiVIdT3Y62U8v9wOjV4rgRcxjofWLosXeRDVDVnYS7iZMNDGVPHDEAVCqblnAuGkI0tP_Svk3H0AuG1c534ItZP3HfElLdnAABGiRNRvn4dpQiumE_wQ-cAnij6xVRHgvBLJ_QWIgM49-vGnDfQzMG8xuoFo1M1mEItg527bzDIx1sSEm8I\/s1700-e365\/fig2.png\" alt=\"\" border=\"0\" data-original-height=\"2400\" data-original-width=\"3840\"\/><\/a><\/div>\n<p>Spreadsheets are not a threat response capability. They&#8217;re a record of how much exposure an organization doesn&#8217;t know it has.<\/p>\n<h2>It&#8217;s not theoreticalrisk<\/h2>\n<p>The argument for OAuth visibility often gets framed as employees piping sensitive information into third-party tools without IT visibility. That&#8217;s a real problem, but it&#8217;s the smaller one. The more pressing issue is that OAuth grants are an active attack vector. The <a href=\"https:\/\/material.security\/resources\/the-supply-chain-is-the-new-watering-hole?utm_source=third-party&amp;utm_medium=blog&amp;utm_campaign=20260505-the-hacker-news\">Drift incident<\/a> makes that concrete.<\/p>\n<p>Drift, a sales engagement platform acquired by Salesloft, maintained OAuth integrations with Salesforce instances across hundreds of customer organizations. A threat actor tracked by Palo Alto Unit 42 as UNC6395 obtained valid OAuth refresh tokens \u2014 likely through prior phishing campaigns \u2014 and used them to access Salesforce environments belonging to more than 700 organizations.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>The attack&#8217;s structure is a warning: the tokens were legitimate, the integration was legitimate. From the perspective of any perimeter control, nothing was wrong. MFA was bypassed entirely because the attacker wasn&#8217;t logging in \u2014 they were presenting a token that Drift had already been granted permission to use. Once inside, UNC6395 systematically exported data and combed through it for credentials: AWS access keys, Snowflake tokens, passwords.<\/p>\n<p>Cloudflare, PagerDuty, and dozens of others were affected. The full scope is still being assessed.<\/p>\n<p>The Drift incident wasn&#8217;t an attack from a suspicious, unknown app. It was an attack <em>through<\/em> a trusted one. The lesson isn&#8217;t that organizations should restrict OAuth integrations \u2014 it&#8217;s that trusting an app at the time of installation doesn&#8217;t mean it stays trustworthy, and that OAuth grants need active, continuous monitoring rather than passive acceptance.<\/p>\n<h2>What monitoring actually needs to look like<\/h2>\n<p>The current generation of OAuth security tools addresses OAuth risk at the point of installation. They check whether a requested permission scope is excessive. They may flag apps from vendors with poor reputations. That&#8217;s useful \u2014 but it&#8217;s not sufficient. For the Drift scenario, a legitimate app whose credentials were later stolen and weaponized \u2014 it catches nothing.<\/p>\n<p>To begin with, vendor trust levels and app scopes are important, but it only tells part of the story. Monitoring the actual behavior of the app\u2013the API calls it makes, the actions it takes\u2013is critical to understanding what the app is <em>actually<\/em> doing, not just what it could do. And even then, without deep visibility into the account(s) the app is linked to, you\u2019re still operating half-blind. A risky app tied to an intern\u2019s account is one thing\u2013the same app being used by a VIP with access to countless sensitive emails, files, and systems is something else entirely.<\/p>\n<p>The Drift attack didn&#8217;t involve a suspicious app requesting unusual permissions at installation. It involved a legitimate app whose credentials were later compromised and weaponized. A tool that only evaluates the grant at the point of creation would have seen nothing wrong. The risk materialized later \u2014 when the token was stolen and used by a different actor entirely.<\/p>\n<p>Effective OAuth security requires:<\/p>\n<ul>\n<li><strong>Continuous behavioral monitoring, not point-in-time review.<\/strong> What is the app actually doing after it&#8217;s been granted access? Monitoring the API calls an OAuth-connected app makes over time reveals anomalies that no static permission review can catch \u2014 sudden spikes in data access, queries for unusual data types, andaccess at unexpected hours.<\/li>\n<li><strong>Blast radius assessment.<\/strong> An OAuth grant connected to an account with read access to thousands of sensitive documents and years of email history is categorically different from the same grant on a freshly provisioned account with limited exposure. The reach of the user&#8217;s account determines the potential impact of a compromised or malicious OAuth connection. Risk scoring should reflect that.<\/li>\n<li><strong>Graduated response matched to organizational risk tolerance.<\/strong> An obviously malicious app \u2014 unknown vendor, broad permissions, anomalous API behavior from day one \u2014 shouldn&#8217;t sit in the environment while a ticket works through a queue. It should be revoked immediately. A mission-critical integration from a major vendor showing mild anomalies warrants human review before any action is taken. The response layer needs to be intelligent enough to tell the difference.<\/li>\n<\/ul>\n<h2>Material&#8217;s OAuth Threat Remediation Agent<\/h2>\n<p>Material Security&#8217;s <a href=\"https:\/\/material.security\/resources\/closing-the-back-door-introducing-materials-oauth-remediation-agent?utm_source=third-party&amp;utm_medium=blog&amp;utm_campaign=20260505-the-hacker-news\">OAuth Threat Remediation Agent<\/a> is built around this more complete model of OAuth risk. The agent runs continuously across an organization&#8217;s Google Workspace environment, monitoring every OAuth-connected application \u2014 not just new ones at the point of grant.<\/p>\n<p><iframe loading=\"lazy\" title=\"Material Security OAuth Remediation Agent\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/66o0LOB20O8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>For each connected app, the agent evaluates three factors together:<\/p>\n<ul>\n<li><strong>Vendor trust and scope analysis<\/strong> \u2014 the standard baseline that most tools stop at<\/li>\n<li><strong>Behavioral monitoring of actual API calls<\/strong> made by the app over time, surfacing anomalies against expected behavior<\/li>\n<li><strong>Blast radius assessment<\/strong> based on the access levels and data exposure of the accounts the app is connected to<\/li>\n<\/ul>\n<p>These inputs combine into a risk signal that reflects both the probability of a problem and its potential impact. When the agent identifies a high-risk grant, it can act immediately \u2014 revoking the token before harm is done. For lower-certainty situations involving mission-critical applications, it surfaces the finding to the security team with full context: what the app is, what it&#8217;s been doing, what it has access to, and what the risk score is.<\/p>\n<p>Organizations configure their own thresholds: how much risk triggers automated remediation, and where the line is for requiring human sign-off. The agent is designed to keep security teams in the loop for the decisions that matter, and out of the loop for the ones that don&#8217;t.<\/p>\n<h2>Closing the back door<\/h2>\n<p>OAuth grants are the default way third-party apps and AI tools connect to the enterprise workspace. That&#8217;s not changing. The number of grants in most environments will continue to grow as AI adoption accelerates. Telling employees they can&#8217;t use AI tools isn&#8217;t a viable security posture for most organizations \u2014 and it wouldn&#8217;t address the threat posed by apps that are legitimate at installation and malicious later.<\/p>\n<p>The answer isn&#8217;t fewer OAuth grants. It&#8217;s better visibility into the ones that exist, continuous monitoring of their behavior, and the operational capability to respond fast enough to matter and smart enough to avoid disrupting the integrations that keep the business running.\u00a0<\/p>\n<p>For security teams who want visibility into what&#8217;s actually connected to their environment \u2014 and the ability to respond when something changes, reach out to <a href=\"https:\/\/material.security\/lp-cloud-office-security?utm_source=third-party&amp;utm_medium=blog&amp;utm_campaign=20260505-the-hacker-news\">Material Security<\/a> for a demo of the <a href=\"https:\/\/material.security\/product\/oauth-agent?utm_source=third-party&amp;utm_medium=blog&amp;utm_campaign=20260505-the-hacker-news\">OAuth Threat Remediation Agent<\/a>.<\/p>\n<div class=\"cf note-b\">Found this article interesting? <span class=\"\">This article is a contributed piece from one of our valued partners.<\/span> Follow us on <a href=\"https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ\" rel=\"noopener\" target=\"_blank\">Google News<\/a>, <a href=\"https:\/\/twitter.com\/thehackersnews\" rel=\"noopener\" target=\"_blank\">Twitter<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/thehackernews\/\" rel=\"noopener\" target=\"_blank\">LinkedIn<\/a> to read more exclusive content we post.<\/div>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic&hellip;<\/p>\n","protected":false},"author":1,"featured_media":812,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[622,1523,1314,1522,47,756],"class_list":["post-811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-attackers","tag-closed","tag-door","tag-havent","tag-security","tag-teams"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=811"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/811\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/812"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}