Listen

Description

(00:00:00) Mission Briefing: Protecting Against Tenant Breaches

(00:00:41) The Enemy's Tactics: Consent Phishing and Token Theft

(00:04:35) The Attack Chain: From Consent to Token Abuse

(00:06:22) Detecting and Preventing Consent Phishing

(00:14:41) Lateral Movement: From Mailbox to SharePoint

(00:17:23) Exfiltration and Data Theft

(00:20:26) Implementing Effective Defenses

(00:26:01) Closing Remarks and Key Takeaways



Perimeter defense is a lie. In this mission briefing, we walk through a real-world style Microsoft 365 breach where attackers use consent phishing, AiTM token theft, and OAuth abuse to bypass MFA, replay stolen cookies, and live off the land with Microsoft Graph. You’ll see the exact Entra logs, Sentinel analytics, and controls that matter—plus the one policy that breaks the entire attack chain: consent control. If you run M365, Entra ID, or Sentinel, this is mandatory listening.

Opening – The Lie of Perimeter Defense Officers, you’re briefed into a different war. Firewalls guard borders, but modern attacks don’t cross borders—they hijack identity. MFA looks like a shield, but stolen tokens and consented apps glide past it like cloaked ships. In this episode, we map an end-to-end Microsoft 365 breach:

There is one policy that breaks this chain. Stay sharp. Segment 1 – Threat Intel Brief: What Modern Crews Actually Do We begin with the current threat picture:Why traditional defenses fail:Telemetry that actually matters:Key doctrine:Segment 2 – Initial Access: Consent Phishing + Token Theft Here’s how the breach starts:Key telemetry & detections:Detection ideas:Quick wins:Segment 3 – Persistence: Living Off the Land with OAuth & Mail Rules Once inside, attackers shift from sprint to residency:Telemetry & detections:Remediation doctrine:Segment 4 – Lateral Movement: From Mailbox to SharePoint to Keys With persistence established, attackers move laterally:

Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-fm-modern-work-security-and-productivity-with-microsoft-365--6704921/support.

If this clashes with how you’ve seen it play out, I’m always curious. I use LinkedIn for the back-and-forth.