Skip to main content
SecureAuthSecureAuth
Back to Blog
Threat Analysis
January 18, 2026
12 min read

ConsentFix: When 'Legitimate Microsoft Login' Is the Trap and How SecureAuth Prevents It

Hossein Rabizadeh

In December 2025, Push Security disclosed ConsentFix, a new "browser-native" social-engineering technique that blends ClickFix-style user prompts with OAuth authorization abuse, allowing attackers to take over accounts without stealing passwords or MFA codes.

The Core Problem

ConsentFix works because it turns a legitimate login into an illicit permission grant: the attacker doesn't need your password or MFA—they just need the user to "helpfully" complete a real OAuth consent step and hand over redeemable authorization material.

What is ConsentFix?

ConsentFix is a phishing technique that targets Microsoft Entra ID OAuth flows. Rather than collecting a password, it tricks a user into providing an OAuth authorization code (or equivalent "redeemable" authorization material), which the attacker can exchange for access and refresh tokens—then operate as the user programmatically across Microsoft 365 and Azure.

ConsentFix Attack Flow

1
User Hits Lure Page

Delivered via compromised sites or malvertising

2
Legitimate Microsoft Flow

Real Entra OAuth authorization journey initiated

3
Copy/Paste Coercion

User copies URL with authorization material

4
Token Redemption

Attacker redeems for access/refresh tokens

It's Microsoft-Targeted by Design

Why Microsoft Is the Prime Target

#1
Most imitated brand in phishing attacks
M365
Ubiquitous across enterprises globally
1:Many
Single identity unlocks broad org access

Why Traditional Controls Fail

Why Traditional Controls Fail

Strong MFA & Passkeys

ConsentFix sidesteps credential theft by abusing authorization and token issuance

User Training

Focuses on 'don't type passwords in weird pages' – but ConsentFix uses real Microsoft pages

Email Security

ConsentFix lures can arrive via compromised sites or ads, not just email

How SecureAuth Prevents ConsentFix

SecureAuth Continuous Authority Model

Continuous Verification

Access decisions made continuously based on real-time context

Policy-Gated Scopes

User can't grant what policy won't allow

Developer Subscription Controls

Apps can't self-attach to powerful consents

1

Continuous Authority

With Continuous Authority, access decisions are made continuously based on real-time context. Even if an attacker arrives holding a "legitimate-looking" token, they still must match the continuous policy and risk posture required at the moment of access.

2

Scope & Consent Governance

SecureAuth stops ConsentFix at the exact point where it needs to "cross the chasm" from authentication to portable authority:

Policy-Gated Scope Grants
  • Only pre-approved clients may receive sensitive scopes (deny unknown/untrusted apps by default)
  • Only specific user populations may grant certain scopes (e.g., admins vs. general workforce)
  • Only under safe context (managed device, known network, normal geo/ASN, low risk) can a grant proceed
  • Step-up controls at consent time (or hard deny) when the request doesn't match expected patterns

Ready to transform your identity security?

See how SecureAuth's Continuous Authority platform can protect your organization.

About SecureAuth

SecureAuth provides identity and access management solutions that enable enterprises to implement customized, resilient authentication infrastructure. Through Continuous Authority, flexible deployment options, and deep composable capabilities, SecureAuth helps organizations defend against modern identity threats while maintaining usability and operational efficiency.

Share this article: