Code Defence Cyber security

Microsoft to Block External Scripts in Entra ID to Stop Phishing

Microsoft has announced a major security update for Entra ID (formerly Azure AD). The platform will now block the execution of external scripts during the sign-in process. This change aims to neutralize “Adversary-in-the-Middle” (AiTM) phishing kits that inject malicious scripts to steal session tokens.

Business Impact

This is a significant hardening of the identity perimeter. It will break many sophisticated phishing tools used to bypass MFA. However, it may also impact legitimate custom branding or customizations organizations have applied to their login pages that rely on external scripts.

Why It Happened

AiTM attacks have become the primary method for bypassing MFA. By preventing the browser from loading unauthorized scripts during authentication, Microsoft is closing a major loophole used by phishing-as-a-service platforms like EvilProxy.

Recommended Executive Action

Direct your IAM team to review your Entra ID branding configurations immediately. Test authentication flows to ensure no legitimate business processes rely on external scripts that will be blocked by this update. Prepare helpdesk staff for potential user tickets.

Hashtags: #Microsoft #EntraID #IAM #MFA #Phishing #CyberSecurity #IdentitySecurity #InfoSec

Scroll to Top

Review My Order

0

Subtotal