New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens

A sophisticated phishing campaign, identified by Microsoft Threat Intelligence, has been exploiting a technique known as “device code phishing” to capture authentication tokens.

This attack, attributed to a group called Storm-2372, has been active since August 2024 and targets a wide range of industries and governments globally.

The campaign uses a phishing technique that tricks users into logging into productivity apps, allowing the attackers to capture authentication tokens that can be used to access compromised accounts.

Device code authentication is a method used to authenticate accounts from devices that cannot perform interactive web-based authentication.

Security experts at Microsoft noted that it involves entering a numeric or alphanumeric code on a separate device to sign in. In device code phishing, attackers generate a legitimate device code request and deceive targets into entering it on a legitimate sign-in page.

This grants the attackers access to authentication and refresh tokens, which they can use to access the target’s accounts and data without needing a password.

Device code phishing attack cycle (Source – Microsoft)

Storm-2372’s Tactics

Storm-2372’s campaign involves creating lures that resemble messaging app experiences, such as WhatsApp, Signal, and Microsoft Teams.

The attackers pose as prominent individuals to build rapport with targets before sending phishing emails that appear to be meeting invitations.

These invitations prompt users to authenticate using a device code, which the attackers use to capture valid access tokens.

Sample Messages from the Threat Actor (Source – Microsoft)

After obtaining access tokens, Storm-2372 uses them to move laterally within compromised networks and harvest emails using Microsoft Graph.

The attackers search for keywords like “username,” “password,” and “credentials” in compromised accounts.

Example of Lure Used in Phishing Campaign (Source – Microsoft)

Example Hunting Query for Microsoft Defender XDR:-

let suspiciousUserClicks = materialize(UrlClickEvents
    where ActionType in ("ClickAllowed", "UrlScanInProgress", "…")
    where UrlChain has_any ("microsoft.com/devicelogin", "login…")
    extend AccountUpn = tolower(AccountUpn)
    project ClickTime = Timestamp, ActionType, UrlChain, Network…

To defend against device code phishing attacks, organizations should restrict the use of device code flows, educate users on phishing tactics, and enforce strong authentication measures such as MFA and phishing-resistant methods like FIDO Tokens.

Implementing Conditional Access policies to monitor risky sign-ins and centralizing identity management can further enhance security.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations worldwide about active exploitation…

4 hours ago

New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts

A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based…

6 hours ago

Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers

An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics…

7 hours ago

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT

TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage…

10 hours ago

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on…

12 hours ago

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with…

13 hours ago