The Government Of Egypt Used Third Party Gmail Applications For Phish Activists Cybers Guards
The attacks used a relatively new technique of spear-phishing called “OAuth phishing,” said experts from Amnesty. Phishing OAuth is when attackers aim to steal the OAuth token of a user account instead of the password of the account. When a user grants the right to access their account to a third-party app, instead of the user’s password, the app receives an OAuth token. These tokens are used as authorization until the user cancels their access....