PROBABLYPWNED
Threat IntelligenceMay 2, 20264 min read

OAuth Token Abuse Surges 146% as Attackers Target Cloud Integrations

AiTM and token theft attacks hit 40,000 daily incidents in 2026. CISA warns OAuth tokens bypass MFA, enabling invisible lateral movement across SaaS apps.

Alex Kowalski

OAuth token abuse has become the defining cloud security threat of 2026. Adversary-in-the-middle (AiTM) attacks and token theft incidents increased 146% over the past year, with security firms now detecting nearly 40,000 incidents daily according to Obsidian Security's 2026 SaaS threat research.

The shift from targeting passwords to stealing tokens reflects a fundamental change in attacker strategy. Modern enterprises average 342 SaaS applications, each representing potential entry points where compromising a single integration can cascade into dozens of connected systems.

Why Tokens Have Become the Primary Target

OAuth tokens solve a legitimate problem: allowing applications to access resources on behalf of users without sharing passwords. But the features that make tokens useful also make them dangerous in adversary hands.

Stolen tokens bypass multi-factor authentication completely. Once an attacker obtains a valid token, no password or MFA prompt stands between them and the target system. The token is the credential.

Unlike session cookies that expire when browsers close, OAuth refresh tokens often persist for months. Integration tokens issued to SaaS applications can survive indefinitely with minimal oversight. Security teams focused on human identity threats frequently overlook these non-human identities operating through trusted integrations.

Recent Incidents Show the Pattern

The Vercel breach we covered in April demonstrates the attack pattern clearly. Attackers compromised Context.ai, a third-party AI tool, then leveraged its Google Workspace OAuth tokens to access Vercel's internal systems. The chain moved from infostealer malware to OAuth tokens to production infrastructure in days.

Wiz researchers noted the attack constituted "a double supply chain attack, where access to Context.ai was leveraged to gain access to their customers, including Vercel, and then Vercel's customers." The compromised OAuth application had been granted broad permissions by at least one Vercel employee—a common scenario in enterprises where convenience often trumps security.

The Salesforce breach affecting over 700 organizations followed an identical pattern. Threat actor UNC6395 exploited stolen OAuth tokens from the Salesloft Drift third-party application between August 8-18, 2025. Rather than attacking Salesforce directly, they weaponized a trusted integration, exfiltrating not just Salesforce data but sensitive AWS keys and Snowflake credentials.

Device code phishing represents another vector. EvilTokens campaigns have compromised 340+ Microsoft 365 organizations across five countries since February 2026. Victims authenticate on Microsoft's real infrastructure, completing legitimate MFA prompts, while attackers capture the resulting tokens.

Why Detection Fails

Traditional security models aren't built for this threat. Most detection focuses on suspicious logins, MFA bypass attempts, or anomalous user behavior—patterns associated with human attackers.

Token-based attacks don't look like break-ins because they aren't break-ins. Attackers log in as trusted applications using valid credentials. The activity blends with legitimate integration traffic that security teams have been trained to ignore.

ShinyHunters demonstrated this during their recent campaign targeting Snowflake customers, where stolen tokens enabled silent access to data warehouses without triggering MFA challenges or EDR alerts. The same group reportedly demanded $2 million from Vercel after the Context.ai compromise.

CISA and NIST Response

Federal agencies have taken notice. CISA and NIST released draft Interagency Report 8597 in December 2025, providing implementation guidance for protecting tokens and assertions from forgery, theft, and misuse.

The report identifies several critical gaps: weak token validation, inadequate key management, insufficient logging, and over-permissioned integration tokens. It warns that "cybercriminals are compromising identity tokens and assertions—through theft, modification or forgery—to infiltrate protected resources."

CISA specifically called out nation-state actors exploiting weaknesses in token authentication and urged cloud providers to enhance controls around token validation, secrets management, access protocols, and forensic logging.

What Organizations Should Do

Audit existing integrations immediately. Most enterprises have no complete inventory of OAuth applications accessing their systems. Start with high-value targets—cloud identity providers, CRM systems, development platforms.

Enforce least-privilege permissions. The Vercel breach exploited an employee who had granted "Allow All" permissions to a third-party app. Require explicit scope definitions for every integration.

Implement token lifetime limits. Integration tokens shouldn't persist indefinitely. Configure refresh token rotation and set maximum lifetimes appropriate to the application's actual needs.

Monitor non-human identity activity. Security tools must distinguish between human and service account behavior. Unusual query patterns, bulk data access, or geographic anomalies from integration accounts warrant investigation.

Revoke and rotate proactively. When third-party vendors disclose breaches—as Context.ai did—assume your tokens are compromised. Revoke immediately, rotate credentials, and audit access logs for the exposure window.

The shift from password-based to token-based attacks represents the natural evolution of cloud security threats. Organizations built their defenses around protecting human credentials. Attackers adapted by targeting the machine-to-machine trust that makes modern SaaS ecosystems function—a trend we continue to track in our hacking news coverage.

That ecosystem is now the attack surface.

Related Articles