The invisible key: Securing the new attack vector of OAuth tokens
- Track: Security
- Room: UB5.132
- Day: Saturday
- Start: 14:00
- End: 14:25
- Video only: ub5132
- Chat: Join the conversation!
OAuth tokens are the new crown jewels. Once issued, they bypass MFA and give API-level access that is hard to monitor. The opaque nature of their use and the difficulty in monitoring their activity create a dangerous blind spot for security teams, making them a primary target for attackers. This presentation will delve into the lifecycle of OAuth tokens, explore real-world attack vectors, and provide actionable strategies for protecting these high-value assets. We will also review the tactics, techniques, and procedures (TTPs) of notorious gangs like ShinyHunters and Scattered Spider, as demonstrated in the 2025 Salesforce attacks.
Speakers
| Gianluca Varisco |