Scams & Phishing News Hackers Exploit OAuth Device Flow to Steal Microsoft 365 Tokens

Brownie2019

Level 23
Thread author
Verified
Well-known
Forum Veteran
Mar 9, 2019
982
4,976
2,168
Germany
Hackers are rapidly weaponizing a little-known Microsoft authentication feature to hijack enterprise accounts, as device code phishing surges across the threat landscape.

The spike in activity is closely tied to the public release of criminal toolkits and phishing-as-a-service (PhaaS) platforms, making the once obscure technique widely accessible.

New kits are appearing almost weekly, many seemingly generated or refined using AI-assisted “vibe coding,” where attackers replicate or slightly modify existing tools to produce near-identical attack chains at scale.

Device code phishing represents a natural evolution of credential harvesting. As organizations improve defenses against password theft and MFA bypass techniques, attackers are shifting toward methods that exploit legitimate authentication workflows.

Instead of stealing credentials directly, adversaries trick users into authorizing malicious applications, granting attackers persistent access without raising immediate suspicion.

Security researchers in proofpoint warn that attackers are abusing the OAuth device authorization flow to steal Microsoft 365 access tokens, enabling stealthy account takeovers that bypass traditional phishing defenses.
Read full Story:
 
Read full Story:
This fits a broader trend, but the article should be read carefully because the headline is stronger than the underlying technical point.

What is happening

The abuse is centered on the OAuth 2.0 device authorization flow, often called the "device code flow."

This is a legitimate Microsoft-supported sign-in method designed for devices that cannot easily show a normal login page, such as smart TVs, kiosks, or command-line tools. The user is given a code, goes to a legitimate Microsoft sign-in page, enters that code, and approves access.

In a phishing scenario, the attacker does not usually "steal the password" directly. Instead, they try to trick the target into entering a valid device code for an attacker-controlled app or session. If the victim completes the approval, the attacker can receive tokens tied to that authorization.

Why defenders care

This technique can be effective because:

  • It uses a real Microsoft login page, so it may look more trustworthy than a fake credential page.
  • It can reduce the value of some traditional anti-phishing checks that focus on fake domains.
  • If the user approves the request, the attacker may gain access tokens without needing the victim's password in hand.
  • It can blend in with legitimate cloud authentication activity if monitoring is weak.

Important limitation

It is not accurate to treat this as an automatic MFA bypass or guaranteed account takeover in every case.

Whether it succeeds depends on several factors, including:

  • What exactly the user approved
  • The scopes/permissions granted
  • Conditional Access policies
  • App consent controls
  • Token protection and session controls
  • How quickly the activity is detected and revoked

So the risk is real, but the outcome is environment-dependent.

What organizations should do

Practical defenses usually include:

  • Restrict or disable device code flow where it is not needed
  • Tighten Microsoft Entra ID app consent policies
  • Require admin consent for higher-risk permissions
  • Review enterprise applications and delegated permissions regularly
  • Monitor sign-ins for device code authentication events and unusual token issuance
  • Train users not to enter device codes unless they initiated the sign-in themselves
  • Use Conditional Access and session-risk controls where available
  • Revoke suspicious refresh tokens and review mailbox rules, OneDrive access, and OAuth app grants after an incident

On the source article

GBHackers often republishes or summarizes security reporting, so for technical accuracy it is better to rely on the original research or vendor documentation when possible. The core idea is plausible and consistent with known OAuth abuse patterns, but I would not rely on the article alone for all implementation details.

Bottom line

Device code phishing is a legitimate and growing concern because it abuses a real authentication workflow rather than a fake login page. The risk is not that Microsoft has a "secret backdoor" feature, but that a valid sign-in flow can be socially engineered and misused if tenant protections and user awareness are weak.
 
  • Like
Reactions: Wrecker4923
“Go to the bank yourself. Here is the transaction approval code. Enter it.”
The bank website is real, but the code belongs to the attacker’s transaction.
 
  • Like
Reactions: Wrecker4923