A sophisticated phishing campaign leveraging the device code authentication flow has been identified by Microsoft Threat Intelligence, targeting a wide range of sectors, including government, NGOs, IT services, and critical industries such as defense and energy.
The campaign, attributed to a threat actor known as Storm-2372, has been active since August 2024 and is assessed to align with Russian state interests.
This novel attack method exploits a legitimate authentication mechanism to compromise user accounts and gain unauthorized access to sensitive data.
The attack capitalizes on the OAuth 2.0 Device Authorization Grant flow, a protocol designed for authenticating devices with limited input capabilities, such as IoT devices or smart TVs.
In this flow, users authenticate by entering a device code on a separate browser-enabled device.
While this method is secure in its intended use cases, attackers have found ways to manipulate it for malicious purposes.
In the observed campaign, Storm-2372 generates legitimate device codes using APIs and lures victims through phishing emails or messages masquerading as legitimate applications like Microsoft Teams or WhatsApp.
Victims are tricked into entering these codes on legitimate sign-in pages, unknowingly granting attackers access tokens.
These tokens allow the attackers to access accounts and services without needing the victim’s password or multi-factor authentication (MFA), enabling lateral movement within networks and prolonged unauthorized access.
Microsoft’s investigation revealed that Storm-2372 extensively used keyword searches to extract data related to credentials, administrative access, and government operations.
Organizations are urged to adopt robust measures to mitigate risks associated with device code phishing:
The exploitation of device code authentication highlights the evolving nature of cyber threats targeting identity systems.
By leveraging trust in legitimate platforms, attackers like Storm-2372 can bypass traditional security measures.
Organizations must remain vigilant, implement advanced detection mechanisms, and educate users about emerging threats to safeguard their digital environments.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…
Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…
Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…