CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 15, 2026

Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens

Cybersecurity News Archived May 15, 2026 ✓ Full text saved

Hackers are exploiting a little-known feature of Microsoft’s authentication system to steal account credentials at scale. Device code phishing campaigns now target organizations worldwide by manipulating the OAuth device authorization flow, turning a security feature into a major vulnerability. This emerging threat has surged dramatically since late 2024, catching security teams unprepared for attacks that […] The post Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens a

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security News Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens By Tushar Subhra Dutta May 15, 2026 Hackers are exploiting a little-known feature of Microsoft’s authentication system to steal account credentials at scale. Device code phishing campaigns now target organizations worldwide by manipulating the OAuth device authorization flow, turning a security feature into a major vulnerability. This emerging threat has surged dramatically since late 2024, catching security teams unprepared for attacks that operate entirely through legitimate Microsoft infrastructure. The spike in device code phishing marks a notable evolution in identity takeover techniques. Previously obscure among cybercriminals, this attack method now appears regularly in campaigns ranging from business email compromise to corporate espionage. From 2023 to 2024, criminals increasingly abandoned traditional credential harvesting pages in favor of device code techniques. Analysts from Proofpoint identified the malicious activity in early 2025 and said in a report shared with Cyber Security News (CSN) that hundreds of campaigns targeted organizations across multiple industries. The research team observed threat actors using device code phishing to gain unauthorized access to Microsoft 365 accounts at an unprecedented scale. Device code phishing landing pages in Spanish (left) and German (right) (Source – Proofpoint) The technique exploits trust in official Microsoft services, making detection exceptionally difficult for traditional security tools. Hackers Abuse OAuth Device Authorization Flow Device code phishing exploits OAuth 2.0 device authorization flow, a feature designed to help users authenticate on devices with limited input capabilities like smart TVs or gaming consoles. When users visit a legitimate Microsoft page and enter a code provided by attackers, the system assumes they are completing normal authentication. Microsoft impersonation landing page containing actor-generated device code (Source – Proofpoint) The victim unknowingly grants full access to their Microsoft 365 account without ever seeing a suspicious login prompt. Attackers typically deliver device codes through email campaigns containing PDF attachments, URLs, or QR codes that redirect victims to the official Microsoft device login page. Once the target enters the code within the 15-minute expiration window, threat actors immediately gain access to authentication tokens. These tokens allow persistent account access even if the victim later changes their password. The technique requires minimal technical skill compared to traditional credential phishing. Threat actors simply generate device codes using legitimate Microsoft APIs and distribute them through social engineering. The seamless integration with Microsoft’s authentication systems means no red flags appear during the process. Email messages often impersonate common business services, urging recipients to take immediate action by entering the provided code. Rising Threat Actor Adoption Multiple threat groups now leverage device code phishing across different attack scenarios. Proofpoint researchers documented campaigns from threat actor TA4903, who distributed device code phishing lures alongside PDF attachments containing CAPTCHA-themed social engineering. The group targeted small businesses and government entities, impersonating services like Microsoft, DocuSign, and Norton. Other threat actors including EvilProxy operators, Storm-365, and groups using the Kali 365 toolkit have integrated device code phishing into their standard operations. The Tycoon 2FA phishing kit added device code capabilities, while researchers observed the technique in campaigns linked to Russian cybercriminal infrastructure. Even security-aware users struggle to identify the attack since the entire process occurs on genuine Microsoft domains without any suspicious indicators. The proliferation accelerated after proof-of-concept tools like ClickFix emerged, lowering barriers to entry for less sophisticated criminals. What began as a technique used by advanced persistent threat groups quickly spread across the threat landscape. Device code phishing now appears in campaigns targeting everyone from individual users to Fortune 500 enterprises. Organizations should implement several defensive measures to counter this threat, Proofpoint said in a report shared with Cyber Security News (CSN). Blocking device code flow where possible through conditional access policies provides the strongest protection. Requiring compliant or managed devices prevents unauthorized authentication attempts from uncontrolled endpoints. Enhanced user awareness training specifically addressing device code phishing attacks is critical, as traditional phishing education does not cover this threat vector. Indicators of Compromise (IoCs):- Type Indicator Description Domain onedrive-9tudh[.]thebootieselmny-thi-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing Domain voicemail-8c[.]min-treyriess-aly-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing Domain wex-9[.]mark-squiress-axerservernes-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing Domain lyr[.]nuskly-msk-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Domain Domain 0uh4-wem-j7u18h[.]vesquezz-serintoncs-rtneres-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing Domain ytgw4-c9n60-xelw[.]vesquezz-serintoncs-rtneres-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing Domain z9746881-9[.]nspoint[.]com Device Code Phishing Domain Domain 014772-[.]nspoint[.]com Device Code Phishing Domain Domain jo2c7259t-[.]nspoint[.]com Device Code Phishing Domain Domain 9803t97c4t9t-[.]nspoint[.]com Device Code Phishing Domain Domain 10399t0b4c-[.]nspoint[.]com Device Code Phishing Domain Domain yg4c05t9t501010-[.]nspoint[.]com Device Code Phishing Domain Domain c649c5c710416-[.]nspoint[.]com Device Code Phishing Domain Domain 757c46-[.]nspoint[.]com Device Code Phishing Domain Domain 187906187-[.]nspoint[.]com Device Code Phishing Domain Domain t918c7186a7-[.]nspoint[.]com Device Code Phishing Domain Domain 1010c5c4t918-[.]nspoint[.]com Device Code Phishing Domain Domain 014772-[.]nspoint[.]com Device Code Phishing Domain Domain 014t90t901-[.]nspoint[.]com Device Code Phishing Domain Domain stelwsystems[.]com B-OX Device Code Phishing Domain Domain marketkarr-lengnefl[.]com B-OX Device Code Phishing Domain Domain realizeextension[.]com B-OX Device Code Phishing Domain Domain servicewithoutinterruption[.]com B-OX Device Code Phishing Domain Domain marketreliabilityservices[.]com B-OX Device Code Phishing Domain Domain kohl-hoff-lasthealthverreitung[.]com B-OX Device Code Phishing Domain Domain reliefsupport[.]com B-OX Device Code Phishing Domain Domain eurostrustwav[.]com B-OX Device Code Phishing Domain Domain trustengagement[.]com B-OX Device Code Phishing Domain Domain methoilness[.]com B-OX Device Code Phishing Domain Domain extendyourreliability[.]com B-OX Device Code Phishing Domain Domain eurosignaltrust[.]com B-OX Device Code Phishing Domain Domain consistentdigital[.]com B-OX Device Code Phishing Domain Domain uninterruptedperformen[.]com B-OX Device Code Phishing Domain Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM. Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google. Tags cyber security cyber security news Copy URL Linkedin Twitter ReddIt Telegram Tushar Subhra Dutta Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics. Trending News PraisonAI Vulnerability Exploited Within Hours of Public Disclosure Hackers Use Fake OpenClaw Installer to Steal Crypto Wallet and Password Manager Credentials NVIDIA Data Breach Reportedly Exposes Personal Information of GeForce Users Claude’s Chrome Extension Vulnerability Allows Malicious Extensions to Steal Gmail and Drive Data Threat Actors Leverage Vercel’s AI Tools to Mass‑Produce Realistic Phishing Sites Latest News Cyber Security News Hackers Use OrBit Rootkit to Harvest SSH and Sudo Credentials From Linux Systems Cyber Security News Microsoft Warns of Attackers Using Trusted HPE Operations Agent for Malware-Free Intrusions Cyber Security News Tycoon 2FA Operators Adopt OAuth Device Code Phishing to Bypass MFA Cyber Security News PraisonAI Vulnerability Exploited Within Hours of Public Disclosure Cyber Security News Amazon Redshift JDBC Driver Vulnerabilities Enables Remote Code Execution Attacks
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    May 15, 2026
    Archived
    May 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗