OAuth Device Code Phishing Campaigns Target Microsoft 365 Accounts
Summary
Hide ▲
Show ▼
A surge in phishing campaigns exploiting Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe. Organizations are advised to strengthen OAuth controls and train users to avoid entering device codes from untrusted sources.
Timeline
-
18.12.2025 18:00 1 articles · 11h ago
OAuth Device Code Phishing Campaigns Surge Targeting Microsoft 365
A surge in phishing campaigns abusing Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe.
Show sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
Information Snippets
-
Threat actors are exploiting Microsoft’s OAuth device code authorization flow to gain unauthorized access to Microsoft 365 accounts.
First reported: 18.12.2025 18:001 source, 1 articleShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
-
The attacks rely on social engineering to trick users into approving malicious applications, enabling account takeover and data theft.
First reported: 18.12.2025 18:001 source, 1 articleShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
-
The OAuth 2.0 device authorization grant is a legitimate process designed for devices with limited input capabilities.
First reported: 18.12.2025 18:001 source, 1 articleShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
-
Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token.
First reported: 18.12.2025 18:001 source, 1 articleShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
-
Campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain.
First reported: 18.12.2025 18:001 source, 1 articleShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
-
The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish.
First reported: 18.12.2025 18:001 source, 1 articleShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
-
Financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare have adopted this technique.
First reported: 18.12.2025 18:001 source, 1 articleShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00
-
Organizations are advised to strengthen OAuth controls and train users to avoid entering device codes from untrusted sources.
First reported: 18.12.2025 18:001 source, 1 articleShow sources
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365 — www.infosecurity-magazine.com — 18.12.2025 18:00