New Device Code Phishing Attack Exploit Device Code Authentication To Capture Authentication Tokens

A sophisticated phishing campaign, identified by Microsoft Threat Intelligence, has been exploiting a technique known as “device code phishing” to capture authentication tokens.

This attack, attributed to a group called Storm-2372, has been active since August 2024 and targets a wide range of industries and governments globally.

The campaign uses a phishing technique that tricks users into logging into productivity apps, allowing the attackers to capture authentication tokens that can be used to access compromised accounts.

Device code authentication is a method used to authenticate accounts from devices that cannot perform interactive web-based authentication.

Security experts at Microsoft noted that it involves entering a numeric or alphanumeric code on a separate device to sign in. In device code phishing, attackers generate a legitimate device code request and deceive targets into entering it on a legitimate sign-in page.

This grants the attackers access to authentication and refresh tokens, which they can use to access the target’s accounts and data without needing a password.

Device code phishing attack cycle (Source – Microsoft)

Storm-2372’s Tactics

Storm-2372’s campaign involves creating lures that resemble messaging app experiences, such as WhatsApp, Signal, and Microsoft Teams.

The attackers pose as prominent individuals to build rapport with targets before sending phishing emails that appear to be meeting invitations.

These invitations prompt users to authenticate using a device code, which the attackers use to capture valid access tokens.

Sample Messages from the Threat Actor (Source – Microsoft)

After obtaining access tokens, Storm-2372 uses them to move laterally within compromised networks and harvest emails using Microsoft Graph.

The attackers search for keywords like “username,” “password,” and “credentials” in compromised accounts.

Example of Lure Used in Phishing Campaign (Source – Microsoft)

Example Hunting Query for Microsoft Defender XDR:-

let suspiciousUserClicks = materialize(UrlClickEvents
    where ActionType in ("ClickAllowed", "UrlScanInProgress", "…")
    where UrlChain has_any ("microsoft.com/devicelogin", "login…")
    extend AccountUpn = tolower(AccountUpn)
    project ClickTime = Timestamp, ActionType, UrlChain, Network…

To defend against device code phishing attacks, organizations should restrict the use of device code flows, educate users on phishing tactics, and enforce strong authentication measures such as MFA and phishing-resistant methods like FIDO Tokens.

Implementing Conditional Access policies to monitor risky sign-ins and centralizing identity management can further enhance security.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

KB5062554 – Microsoft Releases Cumulative Update for Windows 10 With July 2025 Patch Tuesday

Microsoft rolled out its latest cumulative update for Windows 10, version 21H2 and 22H2, as…

9 hours ago

Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users Personal Information

Nippon Steel Solutions has disclosed a significant data breach affecting customer, partner, and employee personal…

10 hours ago

Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks

Recently, two vulnerabilities have been discovered in specific Zoom Clients for Windows, which could enable…

10 hours ago

Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE

Microsoft released patch Tuesday June 2025 as a monthly security update, addressing a total of…

10 hours ago

MediaTek July 2025 Security Update Patches Vulnerabilities Affecting a Wide Range of Their Chipsets

MediaTek has released a comprehensive security bulletin addressing 16 critical vulnerabilities across its extensive chipset…

10 hours ago

Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords

Ivanti has identified and resolved three high-severity vulnerabilities in its Endpoint Manager (EPM) software. If…

11 hours ago