Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens
Cybersecurity NewsArchived May 15, 2026✓ Full text saved
Hackers are exploiting a little-known feature of Microsoft’s authentication system to steal account credentials at scale. Device code phishing campaigns now target organizations worldwide by manipulating the OAuth device authorization flow, turning a security feature into a major vulnerability. This emerging threat has surged dramatically since late 2024, catching security teams unprepared for attacks that […] The post Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens a
Full text archived locally
✦ AI Summary· Claude Sonnet
HomeCyber Security News
Hackers Abuse OAuth Device Authorization Flow to Steal Microsoft 365 Tokens
By Tushar Subhra Dutta
May 15, 2026
Hackers are exploiting a little-known feature of Microsoft’s authentication system to steal account credentials at scale.
Device code phishing campaigns now target organizations worldwide by manipulating the OAuth device authorization flow, turning a security feature into a major vulnerability.
This emerging threat has surged dramatically since late 2024, catching security teams unprepared for attacks that operate entirely through legitimate Microsoft infrastructure.
The spike in device code phishing marks a notable evolution in identity takeover techniques.
Previously obscure among cybercriminals, this attack method now appears regularly in campaigns ranging from business email compromise to corporate espionage.
From 2023 to 2024, criminals increasingly abandoned traditional credential harvesting pages in favor of device code techniques.
Analysts from Proofpoint identified the malicious activity in early 2025 and said in a report shared with Cyber Security News (CSN) that hundreds of campaigns targeted organizations across multiple industries.
The research team observed threat actors using device code phishing to gain unauthorized access to Microsoft 365 accounts at an unprecedented scale.
Device code phishing landing pages in Spanish (left) and German (right) (Source – Proofpoint)
The technique exploits trust in official Microsoft services, making detection exceptionally difficult for traditional security tools.
Hackers Abuse OAuth Device Authorization Flow
Device code phishing exploits OAuth 2.0 device authorization flow, a feature designed to help users authenticate on devices with limited input capabilities like smart TVs or gaming consoles.
When users visit a legitimate Microsoft page and enter a code provided by attackers, the system assumes they are completing normal authentication.
Microsoft impersonation landing page containing actor-generated device code (Source – Proofpoint)
The victim unknowingly grants full access to their Microsoft 365 account without ever seeing a suspicious login prompt.
Attackers typically deliver device codes through email campaigns containing PDF attachments, URLs, or QR codes that redirect victims to the official Microsoft device login page.
Once the target enters the code within the 15-minute expiration window, threat actors immediately gain access to authentication tokens. These tokens allow persistent account access even if the victim later changes their password.
The technique requires minimal technical skill compared to traditional credential phishing. Threat actors simply generate device codes using legitimate Microsoft APIs and distribute them through social engineering.
The seamless integration with Microsoft’s authentication systems means no red flags appear during the process. Email messages often impersonate common business services, urging recipients to take immediate action by entering the provided code.
Rising Threat Actor Adoption
Multiple threat groups now leverage device code phishing across different attack scenarios. Proofpoint researchers documented campaigns from threat actor TA4903, who distributed device code phishing lures alongside PDF attachments containing CAPTCHA-themed social engineering.
The group targeted small businesses and government entities, impersonating services like Microsoft, DocuSign, and Norton.
Other threat actors including EvilProxy operators, Storm-365, and groups using the Kali 365 toolkit have integrated device code phishing into their standard operations.
The Tycoon 2FA phishing kit added device code capabilities, while researchers observed the technique in campaigns linked to Russian cybercriminal infrastructure.
Even security-aware users struggle to identify the attack since the entire process occurs on genuine Microsoft domains without any suspicious indicators.
The proliferation accelerated after proof-of-concept tools like ClickFix emerged, lowering barriers to entry for less sophisticated criminals.
What began as a technique used by advanced persistent threat groups quickly spread across the threat landscape. Device code phishing now appears in campaigns targeting everyone from individual users to Fortune 500 enterprises.
Organizations should implement several defensive measures to counter this threat, Proofpoint said in a report shared with Cyber Security News (CSN). Blocking device code flow where possible through conditional access policies provides the strongest protection.
Requiring compliant or managed devices prevents unauthorized authentication attempts from uncontrolled endpoints. Enhanced user awareness training specifically addressing device code phishing attacks is critical, as traditional phishing education does not cover this threat vector.
Indicators of Compromise (IoCs):-
Type Indicator Description
Domain onedrive-9tudh[.]thebootieselmny-thi-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing
Domain voicemail-8c[.]min-treyriess-aly-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing
Domain wex-9[.]mark-squiress-axerservernes-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing
Domain lyr[.]nuskly-msk-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Domain
Domain 0uh4-wem-j7u18h[.]vesquezz-serintoncs-rtneres-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing
Domain ytgw4-c9n60-xelw[.]vesquezz-serintoncs-rtneres-om-s-oundh[.]workers[.]dev EvilTokens Device Code Phishing Landing
Domain z9746881-9[.]nspoint[.]com Device Code Phishing Domain
Domain 014772-[.]nspoint[.]com Device Code Phishing Domain
Domain jo2c7259t-[.]nspoint[.]com Device Code Phishing Domain
Domain 9803t97c4t9t-[.]nspoint[.]com Device Code Phishing Domain
Domain 10399t0b4c-[.]nspoint[.]com Device Code Phishing Domain
Domain yg4c05t9t501010-[.]nspoint[.]com Device Code Phishing Domain
Domain c649c5c710416-[.]nspoint[.]com Device Code Phishing Domain
Domain 757c46-[.]nspoint[.]com Device Code Phishing Domain
Domain 187906187-[.]nspoint[.]com Device Code Phishing Domain
Domain t918c7186a7-[.]nspoint[.]com Device Code Phishing Domain
Domain 1010c5c4t918-[.]nspoint[.]com Device Code Phishing Domain
Domain 014772-[.]nspoint[.]com Device Code Phishing Domain
Domain 014t90t901-[.]nspoint[.]com Device Code Phishing Domain
Domain stelwsystems[.]com B-OX Device Code Phishing Domain
Domain marketkarr-lengnefl[.]com B-OX Device Code Phishing Domain
Domain realizeextension[.]com B-OX Device Code Phishing Domain
Domain servicewithoutinterruption[.]com B-OX Device Code Phishing Domain
Domain marketreliabilityservices[.]com B-OX Device Code Phishing Domain
Domain kohl-hoff-lasthealthverreitung[.]com B-OX Device Code Phishing Domain
Domain reliefsupport[.]com B-OX Device Code Phishing Domain
Domain eurostrustwav[.]com B-OX Device Code Phishing Domain
Domain trustengagement[.]com B-OX Device Code Phishing Domain
Domain methoilness[.]com B-OX Device Code Phishing Domain
Domain extendyourreliability[.]com B-OX Device Code Phishing Domain
Domain eurosignaltrust[.]com B-OX Device Code Phishing Domain
Domain consistentdigital[.]com B-OX Device Code Phishing Domain
Domain uninterruptedperformen[.]com B-OX Device Code Phishing Domain
Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
Tags
cyber security
cyber security news
Copy URL
Linkedin
Twitter
ReddIt
Telegram
Tushar Subhra Dutta
Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.
Trending News
PraisonAI Vulnerability Exploited Within Hours of Public Disclosure
Hackers Use Fake OpenClaw Installer to Steal Crypto Wallet and Password Manager Credentials
NVIDIA Data Breach Reportedly Exposes Personal Information of GeForce Users
Claude’s Chrome Extension Vulnerability Allows Malicious Extensions to Steal Gmail and Drive Data
Threat Actors Leverage Vercel’s AI Tools to Mass‑Produce Realistic Phishing Sites
Latest News
Cyber Security News
Hackers Use OrBit Rootkit to Harvest SSH and Sudo Credentials From Linux Systems
Cyber Security News
Microsoft Warns of Attackers Using Trusted HPE Operations Agent for Malware-Free Intrusions
Cyber Security News
Tycoon 2FA Operators Adopt OAuth Device Code Phishing to Bypass MFA
Cyber Security News
PraisonAI Vulnerability Exploited Within Hours of Public Disclosure
Cyber Security News
Amazon Redshift JDBC Driver Vulnerabilities Enables Remote Code Execution Attacks