← Back to news

Claude Code OAuth Tokens Can Be Stolen Through Stealthy MCP Hijacking

SecurityWeek07/05/2026, 14:33
Read full article →

Summary

AI-Generated

Key Points:

  • OAuth tokens in Claude Code can be stolen through a stealthy man-in-the-middle (MITM) attack, allowing attackers to gain unauthorized access to connected tools.
  • The attack targets the MCP configuration stored in ~/.claude.json, enabling redirection of traffic through the attacker’s infrastructure without user awareness.
  • Recommended actions include monitoring for changes in Claude Code configurations, MCP server URLs, OAuth refresh behaviors, and unusual SaaS API activities.

Technical Details: Attackers exploit a vulnerability by installing a tailored npm package that modifies the MCP server configuration, allowing them to intercept OAuth tokens during transmission. This method leverages a post-installation hook to ensure persistence and stealth.

MITRE ATT&CK Techniques:

  • T1071.001 - Application Layer Protocol: Web Protocols (Command and Control)
  • T1550.002 - Use Alternate Authentication Material: OAuth (Credential Access)
  • T1553.001 - Subvert Trust Controls: Code Signing (Defense Evasion)

IOCs Mentioned: None mentioned

Join the discussion — sign up to comment, upvote, and save articles.

Discussion

or to comment
Loading...

Loading comments...

Join 5,000+ security professionals

Get access to curated threat intel, upvote articles, join discussions, and build your karma in the SOC community.