“ConsentFix” Phishing Attacks & Why They Matter: Stealthily Stealing OAuth Access via the Browser

Erin Kuffel
Lead Threat Researcher
February 11, 2026
Share this post

New ConsentFix Attacks Abuse Legitimate OAuth Flows

ConsentFix is a newly observed browser-based phishing technique. Named based on its purported predecessor, ClickFix, ConsentFix has similar social engineering prompts to ClickFix attacks. However, where ClickFix requires a user to paste malicious commands to compromise the host device, ConsentFix tricks a user into pasting an OAuth authorization code to an attacker-controlled site, thereby compromising the victim’s cloud account. 

Example ConsentFix Attack Scenario, Compromised Microsoft Account

  1. A user is prompted by an attacker-controlled web page to authenticate their Microsoft account via a legitimate Microsoft sign-in URL. 
  2. After authenticating, the sign-in flow legitimately redirects the user to a URL containing an authorization code tied to the user’s account. 
  3. The user then copies and pastes the URL into the malicious web page, per its instructions. 
  4. With the OAuth authorization code tied to the victim’s account, the attacker can now gather access tokens, gaining access to and compromising the victim’s Microsoft account.

Traditional Controls Miss ConsentFix, A Browser-Based Phishing Attack

Traditional security defenses are likely to miss this malicious activity because ConsentFix abuses legitimate OAuth authentication and consent flows that occur within the browser. 

MFA is successfully bypassed without hindrance. The endpoint doesn’t see phishing page prompts. And email security is completely avoided when the attack originates through a malvertisement, SEO poisoning, or a compromised website.

How BDR Detects ConsentFix in Practice

Browser detection and response (BDR) tools can provide valuable insight into what is actually happening in users’ browsers. 

By empowering organizations with visibility into user activities in the browser and the ability to investigate browser sequences, and not just single events in time, BDR solutions are uniquely positioned to detect and prevent browser-based attacks.  

Keep Aware specifically empowers security teams to defend against phishing attacks like ConsentFix by identifying suspicious user activity in the browser and flagging OAuth URLs pasted into untrusted sites.

Approximate flow of browser activity as observed by Keep Aware for a ConsentFix attack.

What Security Teams Should Do for ConsentFix

A strong security defense against phishing attacks includes educating end users on how to spot them. Specifically for ConsentFix, encourage users to avoid pasting any authentication or other sensitive URLs into suspicious and untrusted sites. 

Keep Aware strongly recommends reviewing browser telemetry and BDR alerts for suspicious consent and authentication activity and treating browser visibility as a high-quality signal in identity defense. Because ConsentFix is a reminder that modern phishing attacks happen where users work—inside the browser.

Table of contents
Follow Keep Aware
Subscribe to Keep Aware

Stay up to date with the latest threat posts and browser security news from Keep Aware

Thank you for following Keep Aware!
Oops! Something went wrong while submitting the form.
Ready to see Keep Aware in action?
Schedule a personalized demo today and see how Keep Aware can protect your organization's biggest workplace.