Breaking
March 29, 2025

The growing threat of device code phishing and how to defend against It | usagoldmines.com

Just as we think we’re getting one step ahead of cybercriminals, they find a new way to evade our defenses.

The latest method causing trouble for security teams is that of device code phishing, a technique that tricks users into granting access to sensitive accounts without attackers needing to steal a password.

Microsoft recently issued a warning about a particular device code phishing campaign being conducted by Storm-2372, where a supposed Russian-backed threat actor was wreaking havoc by hijacking user sessions through legitimate authentication flows. These attacks are trickier to detect than usual given that they exploit real login pages (rather than the spoofed versions that traditional phishing techniques relied on) and are capable of bypassing multi-factor authentication (MFA).

The recent warning from Microsoft will most likely be the first of many. Various other platforms follow the same style of authentication flows and attackers will most likely replicate the technique elsewhere. It is down to security teams once again to identify the warning signs of this new breed of phishing, and implement the best cybersecurity practices to get ahead of the curve.

Understanding device code phishing

Unlike traditional credential phishing attacks, device code phishing is unique in that there is no need to directly steal a password. Instead, attackers manipulate victims into handing over access to their accounts by exploiting authentication methods designed to make logging in easier.

They start the same way as most email attacks do: through social engineering. By impersonating a trusted colleague or IT administrator, the attackers send an email invitation to an online meeting (often a Microsoft Teams meeting) that looks legitimate. The email is designed to appear normal – for instance, it might look like a genuine Teams meeting invite.

When the victim clicks the link in the fake invite, they are prompted to log in using a special code (the “device code”), which is provided by the attacker. And because the website they land on is a real Microsoft login page, the user doesn’t suspect anything phishy.

What makes this technique especially dangerous is that it exploits legitimate authentication systems without creating counterfeit ones. This removes the need for attackers to steal passwords. Instead, they can gain access by capturing session tokens which allow them to operate without triggering additional authentication prompts. And because the tokens are already verified, attackers can often bypass MFA.

At first glance, nothing seems unusual. Suspicion is reduced due to the official Microsoft website, and therefore, victims won’t hesitate to enter a device code to authenticate the session. However, instead of linking their own device, they are unknowingly authorizing the attacker’s session. Once access is granted, the attacker has the keys to the kingdom and is free to operate within the victim’s account, access sensitive information, and launch lateral attacks.

How users can recognize and avoid these attacks

Device code phishing has created a minefield where legitimate tools are utilized for malicious purposes. Organizations must be proactive in recognizing these attacks and be sure to have effective authentication security measures in place.

Users should always treat unexpected meeting invites with suspicion, especially if they contain login prompts that require immediate action. Before entering any device code, users should verify the legitimacy of the request through a separate communication channel, such as a direct phone call or an internal messaging platform. If a login request appears out of the blue, it’s always best to avoid proceeding until its authenticity is confirmed.

Device codes are particularly impactful as they are designed to be entered on trusted devices. As a result, users should never share a login code with another person or enter a code they receive via email or chat unless they personally initiated the request. Legitimate services will never email a device code and then ask a user to input it on a separate website. If workforces can get to grips with this fundamental security principle, it can prevent many device code phishing attempts from succeeding.

Organizational steps to mitigate risk

Protecting against these attacks can’t rely solely on the user and organizations must take steps to reduce the risk of device code phishing.

One of the most effective measures is to disable any unnecessary device code authentication flows. If it isn’t essential for business operations, then it should be removed to eliminate a significant attack vector. Security teams should regularly review authentication policies and restrict device code logins to only trusted devices.

Conditional access policies go one step further, as they can restrict authentication attempts based on user behavior, device type, geographic location, and risk level. If a login attempt occurs from an unfamiliar location or outside of approved business hours, access can be blocked or require additional verification.

This is why it’s key to embrace behavioral AI measures which can establish baseline “normal” behaviors within an organization’s IT environment, and in turn question anything that seems out of the ordinary. Behavioral AI systems analyze characteristics like login patterns to detect anomalies, such as multiple authentication attempts from different locations or unusual device code submissions. By comparing these activities to known-good user behaviors, deviations from the norm can be flagged as suspicious.

And since device code phishing hinges on meeting invites to spread the attack, these should also be monitored. Security teams should regularly audit and flag unusual meeting request patterns, particularly those originating from compromised accounts.

Lastly, security awareness programs should be an ongoing feature of any cybersecurity strategy. Cyber threats evolve constantly, so training should also be continuous. Employees must be trained to recognize the warning signs of device code phishing and understand the risks of entering authentication codes without verification. Creating a culture where security is front of mind when handling unexpected requests is vital.

The time to act is now

As this latest technique continues to prove effective, cybercriminals will no doubt expand their use of device code phishing. Organizations must act now to defend against this emerging threat. A combination of user awareness and strong security policies which are strengthened by advanced threat detection can help organizations to stay ahead.

The sooner organizations implement these measures, the sooner they can reduce their exposure to device code phishing and protect their employees, data, and systems from this growing cyber threat.

We’ve listed the best identity management software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

The CDC buried a measles forecast that stressed the need for vaccinations Patricia Callahan, ProPubl...

The Fujifilm X100VI effect – how it's sparked a compact camera price boom and what I'd buy instead m...

Need some help using AI for the first time? You’re not just limited to ChatGPT | usagoldmines.com

An everyday Chromebook for the everyday family — 81% off | usagoldmines.com

ICYMI: the week's 7 biggest tech stories from Nintendo's last Switch direct to the Google Pixel 9a f...

I tried Mind Maps in NotebookLM and it's my new favorite feature erichs211@gmail.com (Eric Hal Schwa...

Here’s your first hands-on look at the Star Wars: Grogu, Mandalorian, R2-D2, and Darth Vader earbuds...

New Windows 11 build makes mandatory Microsoft Account sign-in even more mandatory Andrew Cunningham...

Elon Musk’s X has a new owner—Elon Musk’s xAI Jon Brodkin | usagoldmines.com

Six Things to Know About Apple's Upcoming Foldable iPhone Juli Clover | usagoldmines.com

Why do LLMs make stuff up? New research peers under the hood. Kyle Orland | usagoldmines.com

This Powerful, Portable Speaker Is $70 Off During Amazon's Big Spring Sale Daniel Oropeza | usagoldm...

Beyond RGB: A new image file format efficiently stores invisible light data Benj Edwards | usagoldmi...

Samsung’s One UI 7 Rollout Should Happen Quickly for a Bunch of Devices Kellen | usagoldmines.com

Samsung’s Galaxy Buds 3 Pro are Down to $140 ($110 Off) Kellen | usagoldmines.com

The Best Fitness Watches for Every Kind of Runner Beth Skwarecki | usagoldmines.com

11 Low-Cost, High-Impact Upgrades You Should Do Immediately After Buying a Home Jeff Somers | usagol...

iOS 18.4 Expected Next Week - Here Are the Release Notes Juli Clover | usagoldmines.com

Report: US scientists lost $3 billion in NIH grants since Trump took office Beth Mole | usagoldmines...

Signal controversy: Why the secure messaging app is all over the news | usagoldmines.com

Amazon's Biggest Kindle Is $75 Off Right Now Michelle Ehrhardt | usagoldmines.com

Why Bill Gates is wrong about AI and 3 things he needs to realize erichs211@gmail.com (Eric Hal Schw...

Google discontinues Nest Protect smoke alarm and Nest x Yale lock Ryan Whitwam | usagoldmines.com

Oracle has reportedly suffered 2 separate breaches exposing thousands of customers‘ PII Dan Goodin |...

Use this trick to beat shady ‘dynamic pricing’ when shopping online | usagoldmines.com

These Dutch Ovens Are Less Than $70 Right Now (Including My Favorite One) Allie Chanthorn Reinmann |...

You Can Finally Turn the Page on Some Kindles Without Tapping the Screen Michelle Ehrhardt | usagold...

The Sleep Earbuds I Use Every Night Are $30 Off Right Now Daniel Oropeza | usagoldmines.com

The 'AI economy is currently a closed loop' - and that's probably why OpenAI, not Microsoft, investe...

NASA to put Starliner’s thrusters through an extensive workout before next launch Eric Berger | usag...

Ex-FCC chairs from both parties say CBS news distortion investigation is bogus Jon Brodkin | usagold...

Google is moving on from smoke detectors and smart locks | usagoldmines.com

My Favorite Amazon Deal of the Day: The Dangbei Freedo Portable Projector Daniel Oropeza | usagoldmi...

Facebook's New Friends-Only Feed Lets You Scroll Like It's 2008 Khamosh Pathak | usagoldmines.com

Apple watchOS 12: Everything we know so far stephen.warwick@futurenet.com (Stephen Warwick) | usagol...

Best USB-C monitors 2025: These displays have a hidden talent | usagoldmines.com

The new Windows 11 roadmap shows when you’ll get certain features | usagoldmines.com

How to pick the right in-wall smart dimmers and switches | usagoldmines.com

The best smart dimmer switches of 2025 | usagoldmines.com

Suction Isn't the Only Thing That Matters When Choosing a Robot Vacuum Amanda Blum | usagoldmines.co...

Apple Seeds Second iOS 18.4 and iPadOS 18.4 Release Candidate With Priority Notifications, Ambient M...

MindsEye, the single-player dystopian action game from a former GTA producer gets June release date ...

An old Android RAT has returned with some new tricks - here is what to look out for | usagoldmines....

7 new movies and TV shows to watch on Netflix, Prime Video, Max, and more this weekend (March 28) to...

Google solves its mysterious Pixel problem, announces 9a launch date Ryan Whitwam | usagoldmines.com

Nvidia RTX 5090 cards with missing ROPs are being sold as ‘B-stock’ | usagoldmines.com

Windows 11 will get a surprise feature update in April | usagoldmines.com

Google Ends Production of Nest Protect, Nest x Yale Lock – Here’s What You Need to Know Kellen | usa...

Save Time Resizing Images on Mac With a Quick Action Tim Hardwick | usagoldmines.com

Marvel sleuths think they've solved the case about Avengers: Doomsday's story, and it's all down to ...

I experienced Snap’s new multiplayer AR and I’m completely sold on an AR glasses filled future hamis...

Xiaomi's Google TV Streamer rival gets a new processor and a much-needed storage leap | usagoldmine...

Google Pixel 9a delay ends – here's when you'll be able to buy one philip.berne@futurenet.com (Phili...

A future Apple Watch could debut a glass frame with touch controls stephen.warwick@futurenet.com (St...

I'm obsessed with Netflix's new horror comedy movie that has a glowing 94% Rotten Tomatoes rating lu...

Hang on handheld fans, we could be seeing AMD's FSR 4 upscaling on new handhelds after all - if this...

Firefox patches zero-day security flaw days after Chrome fixes the same issue | usagoldmines.com

Trump annoyed the Smithsonian isn’t promoting discredited racial ideas John Timmer | usagoldmines.co...

Corning’s new Apple-like ceramic glass might save your next phone from disaster Ryan Whitwam | usago...

This Ryzen 7 mini PC with 32GB RAM is a steal for $300 | usagoldmines.com

Office is too slow, so Microsoft is making it load at Windows startup | usagoldmines.com

Amazon Spring Sale 2025: Best deals on laptops, USB drives, SSDs, and more | usagoldmines.com

Aston Martin’s new home racing simulator is peak luxury for gamers | usagoldmines.com

R-Drive Image 7.3 review: A backup favorite gets even better | usagoldmines.com

This smart bird feeder with built-in 1080p camera is now 37% off | usagoldmines.com

Google Pixel 9a Arrives April 10 in the US Kellen | usagoldmines.com

Best Apple Deals of the Week: AirPods, iPad, and More in Amazon's Big Spring Sale, Plus Save on Sams...

New Windows 11 roadmap will tell you exactly when to expect Microsoft’s next annoying feature | usa...

Hey listen! The live-action Legend of Zelda movie just got a 2027 release date confirmed by Sony and...

Quordle hints and answers for Saturday, March 29 (game #1160) | usagoldmines.com

NYT Strands hints and answers for Saturday, March 29 (game #391) | usagoldmines.com

NYT Connections hints and answers for Saturday, March 29 (game #657) | usagoldmines.com

5 things I learned when I tested the LG C5 OLED TV, from embracing AI to troublesome reflections jam...

Mullvad VPN brings Multihop to Android – promising to make online tracking even harder chiara.castro...

Data-driven medicine is the key to unlocking the future of the NHS | usagoldmines.com

This new phishing campaign can tailor its messages to target you with your favorite businesses | us...

Digital transformation without cybersecurity is a risk that public sector can’t afford | usagoldmin...

Gran Turismo 7 expands its use of AI/ML-trained NPCs with good effect Jonathan M. Gitlin | usagoldmi...

Nintendo hints at enhanced “Switch 2 Edition games” for new console Kyle Orland | usagoldmines.com

Best PCIe 4.0 SSDs 2025: Top picks from experts | usagoldmines.com

A 25-year-old PC pinball game is my new meditation app | usagoldmines.com

Samsung’s high-speed 256GB flash drive hits its lowest deal price | usagoldmines.com

This Action Camera With Accessories Is Now Under $200 Pradershika Sharma | usagoldmines.com

Google's First-Gen Pixel Watch Is at Its Lowest Price Stephen Johnson | usagoldmines.com

Apple TV+ 'Friday Night Baseball' Returns With New Documentary Series Tim Hardwick | usagoldmines.co...

IKEA's new smart home button with Matter support just leaked –and it looks like my next impulse buy ...

Samsung's new AI smart fridge could stop you from accidentally wasting food, and I've seen it in act...

Thousands of websites have now been hijacked by this devious, and growing, malicious scheme | usago...

Live: Garmin Connect+ backlash – tell us what you think about Garmin's new Premium tier matt.evans@f...

I’m a gaming mouse expert: Here’s why I carefully select my mouse mat | usagoldmines.com

Grab Acer’s RTX-powered OLED gaming laptop for $550 off right now | usagoldmines.com

Microsoft is streamlining logins for Windows, Xbox, and M365 | usagoldmines.com

This Subscription-Free, Solar-Powered 4K Security Camera Kit Is at Its Lowest Price Pradershika Shar...

VPN services may soon become a new target of EU lawmakers after being deemed a "key challenge" chiar...

There’s suddenly tons of Nvidia RTX 5090 GPU stock on the shelves of one US retailer – probably beca...

Black Ops 6 Season 3 release date and time in your timezone | usagoldmines.com

EU will go easy with Apple, Facebook punishment to avoid Trump’s wrath Barbara Moens and Henry Foy, ...

Tel‘Aran’Rhiod at last—the Wheel of Time reveals the world of dreams Andrew Cunningham & Lee Hut...

All-Glass Apple Watch – A First Step Toward Jony Ive's Dream iPhone? Tim Hardwick | usagoldmines.com

‘Our GPUs are melting’ – OpenAI puts limits on image creation and delays rollout to free accounts |...

Leave a Reply