Secplicity Blog

Cybersecurity Headlines & Trends Explained

OAuth Phishing, Foreign Router Risks, and the Rise of Identity-Based Cyber Attacks

Most organizations are still focused on stopping attackers at the perimeter. 

But that’s not how modern attacks are working anymore. 

In Episode 364 of the 443 Podcast, three stories stood out not as isolated incidents, but as signals of a broader shift in how attackers operate: 

  • A potential US ban on foreign-manufactured routers 

  • A phishing campaign that bypasses MFA using OAuth device flows 

  • New data showing where attackers are actually gaining initial access 

Individually, these developments matter. Together, they point to something bigger. 

The attack surface has changed. And many defenses have not kept up. 

For a broader view of the threats shaping today’s landscape, WatchGuard’s latest Biannual Internet Security Report provides additional data and analysis.

Supply Chain Risk Is Moving Closer to the Edge 

The proposed US ban on foreign routers highlights a growing concern: network infrastructure itself is now part of the threat landscape

Historically, supply chain risk was not a top priority for most SMBs or even many MSPs. That is changing quickly. 

This development signals a few important shifts: 

  • Governments are treating networking hardware as a national security issue 

  • Trust in device origin, manufacturing, and firmware is becoming critical 

  • Cost and availability of networking equipment may change significantly 

For MSPs, this introduces a new layer of responsibility. 

It is no longer just about configuring and managing devices. It is about understanding where those devices come from and the risks they may introduce into customer environments. 

MFA Isn’t Failing. It’s Being Circumvented 

One of the most concerning topics discussed is a phishing campaign that abuses OAuth device authentication flows. 

This attack does not: 

  • Steal passwords 

  • Break MFA directly 

  • Exploit a traditional vulnerability 

Instead, it tricks users into authorizing a device through a legitimate workflow. 

The result is significant: 

  • Access without credentials 

  • No traditional MFA challenge to stop it 

  • Persistent access that can last up to 90 days by default 

This reflects a broader shift in attacker behavior. 

Rather than attempting to bypass controls, attackers are increasingly using trusted workflows against organizations

What this means in practice 

Most organizations lack visibility into: 

  • Authorized devices 

  • OAuth tokens 

  • Long-lived session access 

As a result, these attacks can remain undetected long after the initial compromise. 

If identity-driven threats like this are a concern, the Biannual Internet Security Report explores similar trends across real-world attacks.

Attackers Are Using Trusted Access to Get In

Recent threat data reinforces what many security teams are already experiencing: 

  • Identity-based attacks are dominating 

  • Misconfigurations remain a major entry point 

  • Vulnerabilities are being exploited faster than ever 

The key takeaway is straightforward. 

Attackers are choosing the path of least resistance

That often means: 

  • Phishing instead of exploitation 

  • Token abuse instead of credential theft 

  • Misconfigurations instead of zero-day attacks 

In other words, attackers are not breaking in. 

They are logging in. 

What Security Teams and MSPs Should Focus On 

This is not about adding more tools. It is about aligning defenses with how attacks actually happen today. 

1. Audit device and application access regularly 

Review: 

  • Connected devices 

  • OAuth authorizations 

  • Third-party app integrations 

Remove anything that is not recognized or required. 

2. Restrict device authentication flows 

Where possible: 

  • Disable OAuth device code flows for most users 

  • Only allow them for specific, controlled use cases 

3. Strengthen identity as a control plane 

Focus on: 

  • Conditional access policies 

  • Session monitoring 

  • Token and device lifecycle visibility 

4. Improve patching and configuration hygiene 

The fundamentals still matter: 

  • Patch quickly 

  • Eliminate misconfigurations 

  • Reduce unnecessary exposure 

Most attacks are still preventable. But only if defenses are aligned to current attack patterns. 

Key Implications 

The industry has spent years preparing for increasingly sophisticated attacks. 

But many of today’s most effective techniques are not technically complex. They are operationally efficient. 

They exploit: 

  • Trust 

  • Legitimate workflows 

  • Human behavior 

  • Gaps in visibility 

And they do so without triggering traditional defenses. 

If your strategy is still centered on stopping attackers from getting in, you are solving yesterday’s problem. 

Because today, the real question is: 

What happens after they log in? 

For more practical analysis, real-world threat coverage, and expert insights, subscribe to the Secplicity blog.

And for deeper threat intelligence and trend data, download the Biannual Internet Security Report.