OAuth Apps Used to Automate BEC and Cryptomining Attacks
OAuth Apps Used to Automate BEC and Cryptomining Attacks
13 December 2023
Attackers target user accounts without robust authentication measures, creating new OAuth apps with high privileges to ensure continued access and hide their malicious activities.