What is Permission Phishing?

Ankush Johar
1 min readAug 26, 2020

--

Permission Phishing’ or ‘Consent Phishing’: When hackers phish without stealing credentials, but with permissions instead.

Permission Phishing

‘Permission phishing’ is aimed at stealing permissions, and not at stealing passwords. The apps seeking permission appear harmless, but once permissions are granted, it can wreak havoc and gives access to hoards of sensitive data.

In simple words, a hacker leads you to an app that asks you to grant permissions, and once permissions are granted, all underlying data and your authorisation are available to the hacker instantly and remain available until the token or permission is available to the hacker.

Microsoft described this in a blog post and it exploits the widely used authorization technology OAuth 2.0.

Want to learn more about Consent Phishing or Permission Phishing, head on over to the great folks at HumanFirewall.io for a free security training or a free phishing simulation for your employees.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Ankush Johar
Ankush Johar

No responses yet

Write a response