Experts warn that Microsoft Copilot Studio agents are being hijacked to steal OAuth tokens


  • CoPhish uses Copilot Studio agents to phish for OAuth tokens via fake login flows
  • Attackers exploit Microsoft domains to appear legitimate and access sensitive user data
  • Mitigation measures include restricting app consent, enforcing MFA, and monitoring OAuth activity.

Security researchers at Datadog Security Labs are warning of a new phishing technique that uses Microsoft Copilot Studio agents to steal OAuth tokens and allows attackers to access sensitive information in emails, chats, calendars, and more.

The technique is called CoPhish, and while Microsoft has confirmed that it is a social engineering technique, it has acknowledged it and said it will work to fix it.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top