Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365
News

OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365

Team-CWDBy Team-CWDDecember 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A surge in phishing campaigns abusing Microsoft’s OAuth device code authorization flow has been observed with multiple threat clusters using the technique to gain unauthorized access to Microsoft 365 accounts.

According to a new advisory published today by Proofpoint, both state-aligned and financially motivated actors are leveraging social engineering to trick users into approving malicious applications, enabling account takeover, data theft and further compromise.

The attacks rely on the OAuth 2.0 device authorization grant, a legitimate process designed to help users sign in on devices with limited input capabilities.

Once a victim enters a device code generated by an attacker-controlled application on Microsoft’s trusted verification page, the threat actor receives a valid access token. That token can then be used to control the compromised M365 account.

QR Codes, Embedded Buttons and Hyperlinks

While device code phishing is not a new technique, Proofpoint observed a sharp increase in its use by September 2025.

The researchers noted unusually widespread campaigns that relied on QR codes, embedded buttons or hyperlinked text to initiate the attack chain. Lures often claimed to involve document sharing, token reauthorization or security verification.

Read more on OAuth authentication abuse: Russian Threat Actors Target NGOs with New OAuth Phishing Tactics

One campaign detected on December 8 used a fake shared document titled “Salary Bonus + Employer Benefit Reports 25.” Victims were sent emails from attacker-controlled addresses and directed to localized websites branded to match their organization.

Users were then prompted to enter a code on Microsoft’s device login page, inadvertently granting access to their accounts.

Proofpoint linked the growth of these campaigns to readily available phishing tools that simplify device code abuse. Two tools stood out:

  • SquarePhish2, an updated phishing framework that uses QR codes and automates the OAuth device grant flow

  • Graphish, a free phishing kit shared on vetted hacking forums that supports adversary-in-the-middle attacks and OAuth-based authorization abuse

Both tools are designed to be user-friendly and require limited technical skill, making them accessible to a wide range of threat actors.

Financial and State-Aligned Activity

Proofpoint said a financially motivated actor tracked as TA2723 began using device code phishing in October 2025, spoofing salary documents and shared files to lure victims.

The company also observed state-aligned activity, particularly from Russia-linked actors, adopting the technique as part of a broader shift toward passwordless phishing.

One suspected Russia-aligned group, UNK_AcademicFlare, targeted government, academic and transportation sectors in the US and Europe using compromised email accounts and spoofed OneDrive links to deliver device code phishing workflows.

According to Proofpoint, the expansion of these campaigns shows how quickly threat actors adapt legitimate authentication features for malicious ends.

The company said organizations should strengthen OAuth controls and train users not to enter device codes received from untrusted sources.

“Proofpoint assesses that the abuse of OAuth authentication flows will continue to grow with the adoption of FIDO compliant MFA controls.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
Next Article Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How the always-on generation can level up their cybersecurity game

September 11, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.