Transcript
A (0:00)
Foreign. This is Kathleen Campano and this is a Risky Business sponsor interview with Luke Jennings, VP of Research and Development at Push Security. If you haven't heard of them, Push does threat detection and response for browser based attacks. They have a browser extension that watches authentication and identity flows that take place in the browser and alerts SOC teams when something is out of order. Sounds like a simplistic product until you realize that a lot of the enterprise work is being done in browser apps these days. So all of a sudden this sounds like the best product ever. Push is one of the companies that now sees and has to deal with a lot of the first contact attack, Surface, which naturally means they also see a lot of stuff and trends before anyone else. And basically they did, for example, look authored last month a blog post about a new attack he's calling Consent Fix, which they saw against some of their customers first. Welcome, Luke. And would you mind giving us a super simplified explanation of the consent Fix attack?
B (1:06)
Sure. So yeah, this was a really interesting one because you know, we, we deal with a lot of different sort of identity attacks on a daily basis like attacker middle phishing and so forth. And this was something that triggered a few times for different customers hours. And some of our detections blocked it, but it was clearly different to usual and it wasn't even delivered via phishing or anything. What we were seeing was some detections occurring on some sites that were legitimate sites, but people had visited from organic Google searches. But it was triggering certain phishing detections of owls in the browser. And when we really dug deep into it, we realized it was actually a brand new attack technique. So effectively what the attackers were doing were they, they were putting in like a fake cloudflare turnstile. So when the victim would visit this legitimate website from having googled for something, in many cases it was something simple like an online store. Like a legitimate online store and they get a cloudflare turnstile pop up, they click the button and they'd be required to enter an email address. And depending on what they entered, they would either be targeted or not. So it's quite a clever watering hole attack. And if it triggered the actual attack, depending on what they entered, they would effectively be given video instructions and a link to go to a legitimate Microsoft login page. If they were already logged into their Microsoft account, it would just sort of create an error like a404 and the video instructions would tell them to copy and paste the URL back in to validate it. And what that was really doing was actually logging in as the Azure CLI app, which is very powerful. And they were unknowingly then copying the OAuth token across to the attackers and then in the back end they were using it to compromise their account. And that completely circumvents everything as well. Like that even circumvents passkeys if you're using it and the user didn't need to enter a password, they didn't need to run anything. It was a pure like browser native identity attack that could even bypass passkeys in this case. So it turned out to be a really sophisticated attack that definitely been put in place by some pretty clever attackers that put a lot of thought into it.
