Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/Threats/Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization
Threats

Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization

Attackers are abusing a lesser-known element within Microsoft’s authentication system, allowing them to compromise user account credentials at scale. Device code phishing campaigns now target...

Jennifer sherman
Jennifer sherman
May 15, 2026 4 Min Read
1 0

Attackers are abusing a lesser-known element within Microsoft’s authentication system, allowing them to compromise user account credentials at scale.

Device code phishing campaigns now target organizations worldwide by manipulating the OAuth device authorization flow, turning a security feature into a major vulnerability.

This emerging threat has surged dramatically since late 2024, catching security teams unprepared for attacks that operate entirely through legitimate Microsoft infrastructure.

The spike in device code phishing marks a notable evolution in identity takeover techniques.

Previously obscure among cybercriminals, this attack method now appears regularly in campaigns ranging from business email compromise to corporate espionage.

From 2023 to 2024, criminals increasingly abandoned traditional credential harvesting pages in favor of device code techniques.

Analysts from Proofpoint identified the malicious activity in early 2025 and said in a report shared with Cyber Security News (CSN) that hundreds of campaigns targeted organizations across multiple industries.

The research team observed threat actors using device code phishing to gain unauthorized access to Microsoft 365 accounts at an unprecedented scale.

Device code phishing landing pages in Spanish (left) and German (right) (Source - Proofpoint)
Device code phishing landing pages in Spanish (left) and German (right) (Source – Proofpoint)

The technique exploits trust in official Microsoft services, making detection exceptionally difficult for traditional security tools.

Hackers Abuse OAuth Device Authorization Flow

Device code phishing exploits OAuth 2.0 device authorization flow, a feature designed to help users authenticate on devices with limited input capabilities like smart TVs or gaming consoles.

When users visit a legitimate Microsoft page and enter a code provided by attackers, the system assumes they are completing normal authentication.

Microsoft impersonation landing page containing actor-generated device code (Source - Proofpoint)
Microsoft impersonation landing page containing actor-generated device code (Source – Proofpoint)

The victim unknowingly grants full access to their Microsoft 365 account without ever seeing a suspicious login prompt.

Attackers typically deliver device codes through email campaigns containing PDF attachments, URLs, or QR codes that redirect victims to the official Microsoft device login page.

Once the target enters the code within the 15-minute expiration window, threat actors immediately gain access to authentication tokens. These tokens allow persistent account access even if the victim later changes their password.

The technique requires minimal technical skill compared to traditional credential phishing. Threat actors simply generate device codes using legitimate Microsoft APIs and distribute them through social engineering.

The seamless integration with Microsoft’s authentication systems means no red flags appear during the process. Email messages often impersonate common business services, urging recipients to take immediate action by entering the provided code.

Rising Threat Actor Adoption

Multiple threat groups now leverage device code phishing across different attack scenarios. Proofpoint researchers documented campaigns from threat actor TA4903, who distributed device code phishing lures alongside PDF attachments containing CAPTCHA-themed social engineering.

The group targeted small businesses and government entities, impersonating services like Microsoft, DocuSign, and Norton.

Other threat actors including EvilProxy operators, Storm-365, and groups using the Kali 365 toolkit have integrated device code phishing into their standard operations.

The Tycoon 2FA phishing kit added device code capabilities, while researchers observed the technique in campaigns linked to Russian cybercriminal infrastructure.

Even security-aware users struggle to identify the attack since the entire process occurs on genuine Microsoft domains without any suspicious indicators.

The proliferation accelerated after proof-of-concept tools like ClickFix emerged, lowering barriers to entry for less sophisticated criminals.

What began as a technique used by advanced persistent threat groups quickly spread across the threat landscape. Device code phishing now appears in campaigns targeting everyone from individual users to Fortune 500 enterprises.

Organizations should implement several defensive measures to counter this threat, Proofpoint said in a report shared with Cyber Security News (CSN). Blocking device code flow where possible through conditional access policies provides the strongest protection.

Requiring compliant or managed devices prevents unauthorized authentication attempts from uncontrolled endpoints. Enhanced user awareness training specifically addressing device code phishing attacks is critical, as traditional phishing education does not cover this threat vector.

Indicators of Compromise (IoCs):-

Type Indicator Description
Domain onedrive-9tudh[.]thebootieselmny-thi-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing
Domain voicemail-8c[.]min-treyriess-aly-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing
Domain wex-9[.]mark-squiress-axerservernes-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing
Domain lyr[.]nuskly-msk-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Domain
Domain 0uh4-wem-j7u18h[.]vesquezz-serintoncs-rtneres-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing
Domain ytgw4-c9n60-xelw[.]vesquezz-serintoncs-rtneres-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing
Domain z9746881-9[.]nspoint[.]com Device Code Phishing Domain
Domain 014772-[.]nspoint[.]com Device Code Phishing Domain
Domain jo2c7259t-[.]nspoint[.]com Device Code Phishing Domain
Domain 9803t97c4t9t-[.]nspoint[.]com Device Code Phishing Domain
Domain 10399t0b4c-[.]nspoint[.]com Device Code Phishing Domain
Domain yg4c05t9t501010-[.]nspoint[.]com Device Code Phishing Domain
Domain c649c5c710416-[.]nspoint[.]com Device Code Phishing Domain
Domain 757c46-[.]nspoint[.]com Device Code Phishing Domain
Domain 187906187-[.]nspoint[.]com Device Code Phishing Domain
Domain t918c7186a7-[.]nspoint[.]com Device Code Phishing Domain
Domain 1010c5c4t918-[.]nspoint[.]com Device Code Phishing Domain
Domain 014772-[.]nspoint[.]com Device Code Phishing Domain
Domain 014t90t901-[.]nspoint[.]com Device Code Phishing Domain
Domain stelwsystems[.]com B-OX Device Code Phishing Domain
Domain marketkarr-lengnefl[.]com B-OX Device Code Phishing Domain
Domain realizeextension[.]com B-OX Device Code Phishing Domain
Domain servicewithoutinterruption[.]com B-OX Device Code Phishing Domain
Domain marketreliabilityservices[.]com B-OX Device Code Phishing Domain
Domain kohl-hoff-lasthealthverreitung[.]com B-OX Device Code Phishing Domain
Domain reliefsupport[.]com B-OX Device Code Phishing Domain
Domain eurostrustwav[.]com B-OX Device Code Phishing Domain
Domain trustengagement[.]com B-OX Device Code Phishing Domain
Domain methoilness[.]com B-OX Device Code Phishing Domain
Domain extendyourreliability[.]com B-OX Device Code Phishing Domain
Domain eurosignaltrust[.]com B-OX Device Code Phishing Domain
Domain consistentdigital[.]com B-OX Device Code Phishing Domain
Domain uninterruptedperformen[.]com B-OX Device Code Phishing Domain

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerphishingSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own

Next Post

Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us