Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
LECS 970x120 1
Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

Azure under attack: Fake apps imitating Microsoft Teams and Azure Portal

Luca Galuppi : 23 October 2025 07:15

A new wave of digital deception has hit the Microsoft Azure ecosystem, where newly discovered vulnerabilities have allowed cybercriminals to create malicious apps that perfectly mimic official services like Microsoft Teams or the Azure Portal . These “fake” applications are identical to the originals, capable of deceiving even experienced users.

The discovery, made by researchers at Varonis , revealed that Azure security measures designed to block sensitive names could be bypassed using invisible Unicode characters. By inserting characters like the Combining Grapheme Joiner (U+034F) between letters, such as in “Az͏u͏r͏e͏ ͏P͏o͏r͏t͏a͏l” , attackers were able to register apps that appeared legitimate but were interpreted by the system as different. This insidious trick, working with over 260 Unicode characters, allowed the creation of “cloned” apps with sensitive names such as Power BI or OneDrive SyncEngine .

Varonis screenshot: Example of a fake app displaying the name “Azure Portal” using invisible Unicode characters

The real strength of this attack lay in its visual deception: the consent pages of the fake apps appeared authentic, often accompanied by Microsoft icons and logos. Many apps, in fact, didn’t display any verification badges, and users, seeing familiar names, ended up ignoring the “not verified” warnings and granting full permissions.

From there, the second phase began: carefully crafted phishing emails directed victims to spoofed consent pages, where simply clicking “Accept” granted valid access tokens without even entering a password. In other cases, attackers used so-called device passcode phishing, generating a legitimate verification code for a malicious app and convincing the victim to enter it on a seemingly secure portal. Within seconds, the session was hijacked.

Those who work in Microsoft 365 environments know the power of application and delegated consents: the former allow an app to act on behalf of the user, the latter grant autonomous access to resources. In the wrong hands, these permissions become tools for initial access, persistence, and privilege escalation, paving the way for large-scale compromises.

After the report, Microsoft fixed the Unicode bypass bug in April 2025 and closed further variants in October 2025. Patches were distributed automatically, without requiring direct intervention from customers. However, Varonis researchers emphasize that consent monitoring, enforcement of the principle of least privilege, and user training remain essential to mitigating the risk.

This episode demonstrates once again that social engineering remains cybercriminals’ most effective weapon. Complex exploits aren’t necessary when a perfectly imitated login page and a familiar name are enough to convince someone to click. In the cloud world, trust can be a double-edged sword: a seemingly innocuous consent can open the doors to the entire tenant and seriously compromise the security of the Microsoft 365 environment.

Immagine del sitoLuca Galuppi
A lifelong technology enthusiast. I have been working in the IT field for over 15 years. I have particular experience in Firewall and Networking and deal with Network Design and IT Architectures on a daily basis. I currently serve as Senior IT Engineer and PM for an IT Consulting and Services company.

Lista degli articoli
Visita il sito web dell'autore