SecurityGovernment Actors Abuse Oauth Device Codes To Gain Full Access To M365...

Government Actors Abuse Oauth Device Codes To Gain Full Access To M365 Accounts: Here’s What We Know

  • Proofpoint reports increase in phishing exploits in Microsoft OAuth 2.0 device code flow
  • Victims insert code into real Microsoft domains, providing attackers with access tokens
  • Proofpoint recommends blocking device code streams

Cybercriminals, including state-sponsored threat actors, are increasingly abusing Microsoft’s OAuth 2.0 device password authentication flow to take control of Microsoft 365 accounts.

This is evident from a new report by cybersecurity researcher Proofpoint. In one new article Published on December 18, researchers confirm that there has been a sharp escalation in social engineering attacks since September 2025, where victims are tricked into granting access to their accounts.

The attack usually starts with a phishing email containing a link or a QR code. Victims are then informed that in order to view the content, they must re-verify their account by entering a device code on Microsoft’s login page.

Russians, Chinese and others

After entering the code, attackers receive an access token tied to their account, which not only grants them access but also allows email monitoring, lateral movement, and more.

The connection takes place on a real Microsoft domain, Proofpoint explains, meaning traditional phishing defenses and user awareness checks are largely useless. In fact, attackers do not steal passwords or MFA codes, so no alarm is raised.

Proofpoint reports that several groups are currently abusing this technique, including TA2723 (a financially motivated threat actor), UNK_AcademicFlare (a Russian state-sponsored threat actor that targets government and military email accounts for cyber espionage), and several Chinese groups.

It has also been reported that criminals are using various phishing frameworks such as SquarePhish 2 and Graphish, which automate device code exploitation, support QR codes, and integrate with Azure application registries.

More From NewForTech

NHS technology provider in England reports data breach

DXS International, a technology supplier to the National Health...

WatchGuard requires a patch to address the Firebox OS security vulnerability, so update to it now.

WatchGuard fixes a critical RCE vulnerability (CVE-2025‑14733) in the...

New Study Finds That Ai Is Fueling An “unprecedented Increase In Cloud Security Risks.”

The rise of non-human identities. Permissions, Misconfigurations, and Non-Human...

Payroll systems are under attack as attackers take control of accounts.

Attackers abuse help desk employees to gain unauthorized access...

A cheap malware that steals credentials, cryptocurrencies and more is is by SantaStealer.

SantaStealer targets browsers. Wallets. Email apps. Documents. Desktop screenshots.Fourteen...

Pornhub Premium members cyberattack with stolen data

According to Pornhub, a Mixpanel compromise exposed some premium...

Leonardo DiCaprio movie torrent hides complex PowerShell scripts

Fake movie torrents spread malware in stages without the...

The new tool lets anyone monitor messaging apps with just their phone number

Attackers can silently tap phones using only the victim's...