Incident Response Case Study
Thwarting a Global OAuth Phishing Campaign Against a Behavioral Health Organization
A sophisticated phishing-as-a-service attack ran undetected for 86 days. Xpio's Delphi Cyber team contained it in 10 — with zero PHI exposure, zero ransom, and zero service downtime.
- Days dwell time
- 86
- Days to contain
- 10
- PHI exposed
- 0
- Ransom paid
- $0
The Attack
A global phishing campaign hit a behavioral health nonprofit.
The organization was targeted as part of a global phishing-as-a-service campaign that affected 900+ organizations worldwide. The attackers used sophisticated OAuth application abuse to bypass multi-factor authentication and maintain persistent access through malicious service principals, a technique that survives password resets and MFA enrollment.
The attack ran for 86 days before suspicious activity was reported internally. By that point, the attackers had compromised a significant percentage of the organization's user accounts, deployed 13+ malicious OAuth applications, and scanned over 127,000 items across the Microsoft 365 tenant.
When MFA was enabled tenant-wide on day 83, the attackers adapted within 24 hours, pivoting to token replay attacks that bypassed the new MFA controls. This is not a commodity attack. This is an organized, persistent, adaptive threat operation.
Timeline
86 days of attack. 10 days of response.
Initial phishing campaign begins
Employee credentials compromised via phishing
Phishing-as-a-Service kit deployed, MFA bypass active
Mass reconnaissance, 127K+ items scanned
Peak malicious activity, maximum infiltration
Suspicious activity reported internally
Xpio Cyber engaged, investigation begins
Security incident confirmed
Emergency tenant shutdown, all sessions terminated
MFA enforced tenant-wide for all users
Token replay attacks detected and blocked post-MFA
Full containment achieved
The Response
What Xpio did in 10 days.
Emergency Tenant Shutdown
Within 48 hours of engagement, Xpio executed a full emergency shutdown, terminating all active sessions, revoking compromised tokens, and blocking malicious IP ranges across the tenant.
Forensic Investigation
Analyzed millions of audit log records using advanced threat hunting tools. Traced the full attack chain from initial phishing through OAuth abuse, identifying every compromised account and malicious service principal.
Malicious Infrastructure Removal
Identified and removed 13+ malicious OAuth applications and 12+ rogue service principals planted by the attackers. Blocked all associated IP addresses and attack signatures.
Hardening & Remediation
Enforced MFA tenant-wide, locked OAuth app registration to admin-only, blocked foreign IP access, enabled continuous service principal monitoring. Transformed the security posture from reactive to proactive.
Legal & Compliance Coordination
Worked alongside legal counsel to deliver a court-admissible forensic report. Completed all required breach notifications on time. No regulatory penalties. No PHI exposure confirmed through forensic analysis.
67-Page DFIR Report
Delivered a comprehensive digital forensics and incident response report covering attack timeline, indicators of compromise, risk assessment, business impact, remediation actions, and a post-incident security roadmap.
Outcomes
What mattered.
Lessons
What this means for your organization.
MFA is necessary but not sufficient
The attackers adapted within 24 hours of MFA being enabled — pivoting from credential theft to token replay attacks. MFA alone does not stop a determined adversary. You need OAuth app governance, service principal monitoring, conditional access policies, and continuous threat detection.
The policy that saved everything
The organization had a policy of keeping protected health information out of their Microsoft 365 tenant. That single decision prevented what could have been a catastrophic HIPAA breach. The attackers scanned 127,000+ items and found no PHI. Policy saved what technology could not.
Speed matters more than perfection
Emergency tenant shutdown on day 82 was a bold call, it disrupted administrative operations for 24-48 hours. But it stopped the bleeding. Client services ran at 100% throughout. The decision to act fast, accept short-term pain, and contain the threat is what separated this from a catastrophe.
Hope you never need us for this. But if you do, we're ready.
Incident response, digital forensics, and security hardening for healthcare organizations. When it matters most, you want a team that's done it before.
Talk to Our Security Team
