OAuth Device Code Phishing Campaigns Target Microsoft 365 Accounts
Summary
Hide ▲
Show ▼
A surge in phishing campaigns exploiting Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe. Microsoft recently warned of phishing campaigns using OAuth URL redirection mechanisms to bypass conventional phishing defenses. These campaigns target government and public-sector organizations, redirecting victims to attacker-controlled infrastructure without stealing their tokens. Attackers abuse OAuth's standard behavior by crafting URLs with manipulated parameters or associated malicious applications to redirect users to malicious destinations. The attack starts with a malicious application created by the threat actor, configured with a redirect URL pointing to a rogue domain hosting malware. The malicious payloads are distributed as ZIP archives, leading to PowerShell execution, DLL side-loading, and pre-ransom or hands-on-keyboard activity. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe. The adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click 'Next' to access the supposed document. Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish. To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges. Threat actors are now targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts. Unlike previous attacks that utilized malicious OAuth applications to compromise accounts, these campaigns instead leverage legitimate Microsoft OAuth client IDs and the device authorization flow to trick victims into authenticating. This provides attackers with valid authentication tokens that can be used to access the victim's account without relying on regular phishing sites that steal passwords or intercept multi-factor authentication codes. Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages. The attacks target government and public-sector organizations with phishing links that prompt users to authenticate to a malicious application. The malicious OAuth applications are registered with an identity provider, such as Microsoft Entra ID, and leverage the OAuth 2.0 protocol to obtain delegated or application-level access to user data and resources. The attackers create malicious OAuth applications in a tenant they control and configure them with a redirect URI pointing to their infrastructure. The researchers say that even if the URLs for Entra ID look like legitimate authorization requests, the endpoint is invoked with parameters for silent authentication without an interactive login and an invalid scope that triggers authentication errors. This forces the identity provider to redirect users to the redirect URI configured by the attacker. In some cases, the victims are redirected to phishing pages powered by attacker-in-the-middle frameworks such as EvilProxy, which can intercept valid session cookies to bypass multi-factor authentication (MFA) protections. Microsoft found that the 'state' parameter was misused to auto-fill the victim’s email address in the credentials box on the phishing page, increasing the perceived sense of legitimacy. In other instances, the victims are redirected to a 'download' path that automatically delivers a ZIP file with malicious shortcut (.LNK) files and HTML smuggling tools. Opening the .LNK launches PowerShell, which performs reconnaissance on the compromised host and extracts the components required for the next step, DLL side-loading. A malicious DLL (crashhandler.dll) decrypts and loads the final payload (crashlog.dat) into memory, while a legitimate executable (stream_monitor.exe) loads a decoy to distract the victim. Microsoft suggests that organizations should tighten permissions for OAuth applications, enforce strong identity protections and Conditional Access policies, and use cross-domain detection across email, identity, and endpoints.
Timeline
-
19.02.2026 14:30 2 articles · 13d ago
ShinyHunters Extortion Gang Targets Microsoft Entra Accounts
Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts. Unlike previous attacks that utilized malicious OAuth applications to compromise accounts, these campaigns instead leverage legitimate Microsoft OAuth client IDs and the device authorization flow to trick victims into authenticating. This provides attackers with valid authentication tokens that can be used to access the victim's account without relying on regular phishing sites that steal passwords or intercept multi-factor authentication codes. A source told BleepingComputer they believed the ShinyHunters extortion gang was behind the new device code vishing attacks, which the threat actors later confirmed. ShinyHunters was recently linked to vishing attacks used to breach Okta and Microsoft Entra SSO accounts for data theft attacks.
Show sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
-
18.12.2025 18:00 6 articles · 2mo ago
OAuth Device Code Phishing Campaigns Surge Targeting Microsoft 365
Microsoft has identified a new wave of phishing campaigns that abuse OAuth URL redirection mechanisms to bypass conventional phishing defenses. These campaigns target government and public-sector organizations, redirecting victims to attacker-controlled infrastructure without stealing their tokens. The attacks leverage OAuth's standard behavior by crafting URLs with manipulated parameters or associated malicious applications to redirect users to malicious destinations. The malicious payloads are distributed as ZIP archives, leading to PowerShell execution, DLL side-loading, and pre-ransom or hands-on-keyboard activity. Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages. The attacks target government and public-sector organizations with phishing links that prompt users to authenticate to a malicious application. The malicious OAuth applications are registered with an identity provider, such as Microsoft Entra ID, and leverage the OAuth 2.0 protocol to obtain delegated or application-level access to user data and resources. The attackers create malicious OAuth applications in a tenant they control and configure them with a redirect URI pointing to their infrastructure. The researchers say that even if the URLs for Entra ID look like legitimate authorization requests, the endpoint is invoked with parameters for silent authentication without an interactive login and an invalid scope that triggers authentication errors. This forces the identity provider to redirect users to the redirect URI configured by the attacker. In some cases, the victims are redirected to phishing pages powered by attacker-in-the-middle frameworks such as EvilProxy, which can intercept valid session cookies to bypass multi-factor authentication (MFA) protections. Microsoft found that the 'state' parameter was misused to auto-fill the victim’s email address in the credentials box on the phishing page, increasing the perceived sense of legitimacy. In other instances, the victims are redirected to a 'download' path that automatically delivers a ZIP file with malicious shortcut (.LNK) files and HTML smuggling tools. Opening the .LNK launches PowerShell, which performs reconnaissance on the compromised host and extracts the components required for the next step, DLL side-loading. A malicious DLL (crashhandler.dll) decrypts and loads the final payload (crashlog.dat) into memory, while a legitimate executable (stream_monitor.exe) loads a decoy to distract the victim. Microsoft suggests that organizations should tighten permissions for OAuth applications, enforce strong identity protections and Conditional Access policies, and use cross-domain detection across email, identity, and endpoints. Microsoft has removed several malicious OAuth applications identified during the investigation and advises organizations to limit user consent, periodically review application permissions, and remove unused or overprivileged apps.
Show sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
Information Snippets
-
Threat actors are exploiting Microsoft’s OAuth device code authorization flow to gain unauthorized access to Microsoft 365 accounts.
First reported: 18.12.2025 18:003 sources, 6 articlesShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The attacks rely on social engineering to trick users into approving malicious applications, enabling account takeover and data theft.
First reported: 18.12.2025 18:003 sources, 6 articlesShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The OAuth 2.0 device authorization grant is a legitimate process designed for devices with limited input capabilities.
First reported: 18.12.2025 18:003 sources, 6 articlesShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token.
First reported: 18.12.2025 18:003 sources, 6 articlesShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain.
First reported: 18.12.2025 18:003 sources, 6 articlesShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish.
First reported: 18.12.2025 18:003 sources, 6 articlesShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare have adopted this technique.
First reported: 18.12.2025 18:003 sources, 5 articlesShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Organizations are advised to strengthen OAuth controls and train users to avoid entering device codes from untrusted sources.
First reported: 18.12.2025 18:003 sources, 6 articlesShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The attack chains involve tricking victims into entering a device code on Microsoft’s legitimate device login portals, sometimes presented as a one-time password or token re-authorization notification.
First reported: 19.12.2025 19:192 sources, 4 articlesShow sources
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
SquarePhish v1 and v2, and Graphish are the phishing kits used in the attacks, simplifying the phishing process.
First reported: 19.12.2025 19:192 sources, 4 articlesShow sources
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
SquarePhish is a publicly available red teaming tool that targets OAuth device grant authorization flows via QR codes, mimicking legitimate Microsoft MFA/TOTP setups.
First reported: 19.12.2025 19:192 sources, 4 articlesShow sources
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Graphish is a malicious phishing kit shared on underground forums, supporting OAuth abuse, Azure App Registrations, and adversary-in-the-middle (AiTM) attacks.
First reported: 19.12.2025 19:192 sources, 4 articlesShow sources
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Three specific campaigns observed: Salary bonus attacks, TA2723 attacks, and state-aligned activity by UNK_AcademicFlare.
First reported: 19.12.2025 19:192 sources, 4 articlesShow sources
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Proofpoint recommends using Microsoft Entra Conditional Access and introducing a policy on sign-in origin to block these attacks.
First reported: 19.12.2025 19:192 sources, 4 articlesShow sources
- Microsoft 365 accounts targeted in wave of OAuth phishing attacks — www.bleepingcomputer.com — 19.12.2025 19:19
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare.
First reported: 19.12.2025 19:542 sources, 3 articlesShow sources
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe.
First reported: 19.12.2025 19:542 sources, 3 articlesShow sources
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click 'Next' to access the supposed document.
First reported: 19.12.2025 19:542 sources, 3 articlesShow sources
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307.
First reported: 19.12.2025 19:542 sources, 3 articlesShow sources
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Proofpoint said UNK_AcademicFlare is likely a Russia-aligned threat actor given its targeting of Russia-focused specialists at multiple think tanks and Ukrainian government and energy sector organizations.
First reported: 19.12.2025 19:542 sources, 2 articlesShow sources
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish.
First reported: 19.12.2025 19:542 sources, 3 articlesShow sources
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges.
First reported: 19.12.2025 19:542 sources, 4 articlesShow sources
- Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers — thehackernews.com — 19.12.2025 19:54
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Threat actors are targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Unlike previous attacks that utilized malicious OAuth applications to compromise accounts, these campaigns instead leverage legitimate Microsoft OAuth client IDs and the device authorization flow to trick victims into authenticating.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
This provides attackers with valid authentication tokens that can be used to access the victim's account without relying on regular phishing sites that steal passwords or intercept multi-factor authentication codes.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
A source told BleepingComputer they believed the ShinyHunters extortion gang was behind the new device code vishing attacks, which the threat actors later confirmed.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
ShinyHunters was recently linked to vishing attacks used to breach Okta and Microsoft Entra SSO accounts for data theft attacks.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Threat actors have begun using vishing social engineering attacks that no longer require attacker-controlled infrastructure, instead leveraging legitimate Microsoft login forms and standard device code authentication workflows to breach corporate accounts.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
To conduct a device-code phishing attack, threat actors need the client_id of an existing OAuth app, which can be their own or one of Microsoft's existing apps.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Using open-source tools, the attackers generate a 'device_code' and 'user_code' that will be shared with the target for the specified OAuth app.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The threat actors then contact a targeted employee and attempt to convince them to enter the generated user_code on the Microsoft device authentication page, microsoft.com/devicelogin.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Once the OAuth app is connected to an account, threat actors can use the device_code to retrieve the targeted employee's refresh token, which can then be exchanged for access tokens.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Those access tokens allow attackers to access the employee's Microsoft services without having to complete multi-factor authentication again, since MFA was already completed during the initial login.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The threat actors can now authenticate as the user in Microsoft Entra and access SaaS applications configured with SSO (single sign-on) in the victim's tenant, enabling the theft of corporate data for extortion.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
KnowBe4 Threat Labs also discovered a recent campaign that uses traditional phishing emails and websites to deliver device code attacks.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The company first spotted the campaign in December 2025 and said it relies heavily on social engineering lures such as fake payment configuration prompts, document-sharing alerts, and bogus voicemail notifications.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
KnowBe4 recommends that Microsoft 365 account holders block the malicious domains and sender addresses, audit and revoke suspicious OAuth app consents, and review Azure AD sign-in logs for device code authentication events.
First reported: 19.02.2026 14:301 source, 2 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Administrators are also recommended to turn off the device code flow option when not required and to enforce conditional access policies.
First reported: 19.02.2026 14:302 sources, 3 articlesShow sources
- Hackers target Microsoft Entra accounts in device code vishing attacks — www.bleepingcomputer.com — 19.02.2026 14:30
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Microsoft warns of phishing campaigns using OAuth URL redirection mechanisms to bypass conventional phishing defenses.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The campaigns target government and public-sector organizations, redirecting victims to attacker-controlled infrastructure without stealing their tokens.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Attackers abuse OAuth's standard behavior by crafting URLs with manipulated parameters or associated malicious applications to redirect users to malicious destinations.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The attack starts with a malicious application created by the threat actor, configured with a redirect URL pointing to a rogue domain hosting malware.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The malicious payloads are distributed as ZIP archives, leading to PowerShell execution, DLL side-loading, and pre-ransom or hands-on-keyboard activity.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The ZIP file contains a Windows shortcut (LNK) that executes a PowerShell command, conducting host reconnaissance and dropping a decoy document.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
A malicious DLL ("crashhandler.dll") is sideloaded using the legitimate "steam_monitor.exe" binary, decrypting and executing the final payload in memory.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The payload establishes an outbound connection to an external command-and-control (C2) server.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Emails use themes like e-signature requests, Teams recordings, social security, financial, and political to trick users into clicking the link.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The emails are sent via mass-sending tools and custom solutions developed in Python and Node.js, with links either directly included or placed within a PDF document.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Attackers use the state parameter to carry encoded email addresses, increasing the credibility of the phishing page.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Some campaigns leverage the technique to deliver malware, while others send users to pages hosted on phishing frameworks like EvilProxy for credential and session cookie interception.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Microsoft has removed several malicious OAuth applications identified during the investigation.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Organizations are advised to limit user consent, periodically review application permissions, and remove unused or overprivileged apps.
First reported: 03.03.2026 11:202 sources, 2 articlesShow sources
- Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets — thehackernews.com — 03.03.2026 11:20
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take users to malicious pages.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The attacks target government and public-sector organizations with phishing links that prompt users to authenticate to a malicious application.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The malicious OAuth applications are registered with an identity provider, such as Microsoft Entra ID, and leverage the OAuth 2.0 protocol to obtain delegated or application-level access to user data and resources.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The attackers create malicious OAuth applications in a tenant they control and configure them with a redirect URI pointing to their infrastructure.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
The researchers say that even if the URLs for Entra ID look like legitimate authorization requests, the endpoint is invoked with parameters for silent authentication without an interactive login and an invalid scope that triggers authentication errors. This forces the identity provider to redirect users to the redirect URI configured by the attacker.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
In some cases, the victims are redirected to phishing pages powered by attacker-in-the-middle frameworks such as EvilProxy, which can intercept valid session cookies to bypass multi-factor authentication (MFA) protections.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Microsoft found that the 'state' parameter was misused to auto-fill the victim’s email address in the credentials box on the phishing page, increasing the perceived sense of legitimacy.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
In other instances, the victims are redirected to a 'download' path that automatically delivers a ZIP file with malicious shortcut (.LNK) files and HTML smuggling tools.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Opening the .LNK launches PowerShell, which performs reconnaissance on the compromised host and extracts the components required for the next step, DLL side-loading.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
A malicious DLL (crashhandler.dll) decrypts and loads the final payload (crashlog.dat) into memory, while a legitimate executable (stream_monitor.exe) loads a decoy to distract the victim.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
-
Microsoft suggests that organizations should tighten permissions for OAuth applications, enforce strong identity protections and Conditional Access policies, and use cross-domain detection across email, identity, and endpoints.
First reported: 03.03.2026 22:591 source, 1 articleShow sources
- Microsoft: Hackers abuse OAuth error flows to spread malware — www.bleepingcomputer.com — 03.03.2026 22:59
Similar Happenings
Google API Keys Expose Gemini AI Data
Google API keys, previously considered harmless, now expose Gemini AI data due to a privilege escalation. Researchers found nearly 3,000 exposed keys across various sectors, including Google itself. These keys can authenticate to Gemini AI and access private data, potentially leading to significant financial losses for victims. New research from Truffle Security and Quokka has revealed the extent of this issue, with thousands of API keys embedded in client-side code and Android apps. Google has implemented measures to block leaked API keys and notify affected parties.
Starkiller Phishing Kit Bypasses MFA via Proxy-Based Attacks
A new phishing kit called Starkiller has emerged, allowing attackers to bypass multi-factor authentication (MFA) by proxying legitimate login pages. The kit is distributed as a subscription-based service on the dark web, offering real-time session monitoring and keylogging capabilities. It mimics login pages of major services like Google, Microsoft, and banks, routing traffic through attacker-controlled infrastructure to steal credentials and authentication tokens. Starkiller uses Docker containers running headless Chrome instances to serve genuine page content, making it difficult for security vendors to detect or block. The toolkit is sold with updates and customer support, posing a significant escalation in phishing infrastructure. The service is part of a broader cybercrime offering by a threat group called Jinkusu, which provides additional features such as email harvesting and campaign analytics. Starkiller integrates URL shorteners such as TinyURL to obscure the destination URL. It uses a headless Chrome instance inside a Docker container to act as a reverse proxy between the target and the legitimate site. The platform centralizes infrastructure management, phishing page deployment, and session monitoring within a single control panel, combining URL masking, session hijacking, and MFA bypass to streamline phishing operations.
Multi-stage Phishing Campaign Targets Dropbox Corporate Credentials
A sophisticated phishing campaign uses multi-stage techniques to evade detection and steal Dropbox credentials from corporate users. The attack begins with phishing emails claiming urgent business matters, containing PDF attachments with hidden malicious links. These links lead to a spoofed Dropbox login page, where entered credentials are exfiltrated to attacker-controlled Telegram channels. The campaign leverages legitimate cloud infrastructure to bypass security checks and manipulate users into providing their credentials.
Infostealer Malware Targeting Gamers via Roblox Mods
Infostealer malware is increasingly targeting gamers, particularly those using Roblox mods, to compromise corporate networks. Children and teenagers searching for free mods or performance boosters often download malicious executables that harvest credentials and session tokens, leading to enterprise breaches. This malware exploits user behavior rather than software vulnerabilities, making it a significant threat vector for identity theft and corporate access.
Multi-Stage AitM Phishing and BEC Campaigns Target Energy Sector
Microsoft has identified a multi-stage adversary-in-the-middle (AitM) phishing and business email compromise (BEC) campaign targeting organizations in the energy sector. The attackers abused SharePoint file-sharing services to deliver phishing payloads and created inbox rules to maintain persistence and evade detection. The campaign involved leveraging compromised internal identities to conduct large-scale phishing attacks within and outside the victim organizations. Additionally, the AgreeTo Outlook add-in was hijacked and turned into a phishing kit, stealing over 4,000 Microsoft account credentials. The threat actor deployed a fake Microsoft sign-in page, password collection page, exfiltration script, and redirect, exploiting the add-in's ReadWriteItem permissions. This is the first known instance of malware found on the official Microsoft Marketplace. The add-in was abandoned by its developer and the attacker exploited the abandoned domain to serve the phishing kit. The incident highlights the need for better monitoring of add-ins and their associated URLs.