A new phishing technique dubbed ‘CoPhish’ weaponizes Microsoft Copilot Studio agents to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains.
The technique was developed by researchers at Datadog Security Labs, who warned in a report earlier this week that Copilot Studio’s flexibility introduces new, undocumented phishing risks.
Although CoPhish relies on social engineering, Microsoft has confirmed to BleepingComputer that it plans on fixing the underlying causes in a future update.
“We’ve investigated this report and are taking action to address it through future product updates,” a Microsoft spokesperson told BleepingComputer.
“While this technique relies on social engineering, we remain committed to hardening our governance and consent experiences and are evaluating additional safeguards to help organizations prevent misuse.”
Copilot agents and OAuth phishing
Copilot Studio agents are chatbots hosted on copilotstudio.microsoft.com that users can create and customize through “topics,” which are workflows that automate specific tasks.
Agents can be shared on Microsoft’s domain by enabling the “demo website” feature. Because the URL is a legitimate one, it is easier for a user to fall for the trick and log in.
The Login topic, which authenticates the user when starting a conversation with the chatbot, can be configuredfor specific actions, like requesting a verification code or redirecting to another location or service.

Targeting an unprivileged user in the tenant is currently possible if the threat actor is already present in the environment. However, when Microsoft’s default policy changes, the attack would be limited only to OneNote read/write permissions and close the gap for email, chat, and calendar services.
Knowles says that even after Microsoft’s update, it is still possible for an external attacker to “target an Application Administrator with an externally registered application,” because the changes do not apply to high-privileged roles.
Users with administrator privileges in the tenantcan approve permissions requested by internal or external applications, even if they are not verified (e.g. are marked as not being published by Microsoft or their organization).
The Datadog researcher says that a CoPhish attack starts with the threat actor creating a malicious multi-tenantapp with the sign-in topic configured todirect to the authentication provider and to collect the sessiontoken.
Getting the session token is possible by configuring an HTTP request to a Burp Collaborator URL and deliver the access token variable in a “token” header.
report this week.
It should be noted that the redirect action when the victim user clicks on the Login button can be configured to redirect to any malicious URL, and the application consent workflow URL is just one possibility for the attacker.
CoPhish attack on Admins
After activating the malicious agent’sdemo website, an attacker can distribute it to targets in email phishing campaigns or over Team messages.
Since the URL is legitimate and the design of the page, users may think that it is just another MicrosoftCopilot service. Knowles says that one clue that could raise suspicions is the”Microsoft Power Platform” icon, which is easy to miss.

After completing the authentication process, the user will receive no notification about their session token being forwarded to Burp Collaborator and their session being hijacked, but they will be able to chat with the agent.
Furthermore, because the token was sent from Copilot using Microsoft’s IP addresses, the connection to the attacker will not show in the user’s web traffic.
Below is a visual overview of how the CoPhish attack works and the steps from the victim user accessing the malicious app to the attacker receiving the token.
.jpg)
Bill Toulas
Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.