CoPhish Alert: When Microsoft’s Copilot Becomes the Unintended Sidekick for Scammers
Beware the new phishing trick, CoPhish, using Microsoft’s own Copilot agents to sneakily steal your data. It’s like a wolf in sheep’s clothing, asking for OAuth consent through trusted domains. Microsoft promises a fix, but until then, keep your guard up and your permissions tight. Copilot agents and OAuth phishing are no laughing matter!

Hot Take:
Who knew that Microsoft’s helpful AI buddy, Copilot, might need a pilot license? CoPhish is the latest fishing expedition in cybercrime waters, and it seems hackers have found a way to reel in the big fish using Microsoft’s own hooks. Looks like Copilot’s next update might involve learning how to say, “Phish, please!”
Key Points:
- CoPhish uses Microsoft Copilot Studio agents to send fraudulent OAuth consent requests.
- This phishing technique exploits social engineering and legitimate Microsoft domains.
- Microsoft plans to address these vulnerabilities in future product updates.
- The technique can bypass certain security levels, especially targeting admin privileges.
- Organizations are advised to limit admin privileges and strengthen application consent policies.
Already a member? Log in here
