Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems.

Tactics
TA0005 TA0008

Sub-technique of
T1550


See: MITRE ATT&CK