By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts
Tech News

Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts

By Viral Trending Content 7 Min Read
Share
SHARE
device-code-phishing

Microsoft is calling attention to an emerging threat cluster it calls Storm-2372 that has been attributed to a new set of cyber attacks aimed at a variety of sectors since August 2024.

The attacks have targeted government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas sectors in Europe, North America, Africa, and the Middle East.

The threat actor, assessed with medium confidence to be aligned with Russian interests, victimology, and tradecraft, has been observed targeting users via messaging apps like WhatsApp, Signal, and Microsoft Teams by falsely claiming to be a prominent person relevant to the target in an attempt to build trust.

“The attacks use a specific phishing technique called ‘device code phishing’ that tricks users to log into productivity apps while Storm-2372 actors capture the information from the log in (tokens) that they can use to then access compromised accounts,” the Microsoft Threat Intelligence said in a new report.

The goal is to leverage the authentication codes obtained via the technique to access target accounts, and abuse that access to get hold of sensitive data and enable persistent access to the victim environment as long as the tokens remain valid.

Cybersecurity

The tech giant said the attack involves sending phishing emails that masquerade as Microsoft Teams meeting invitations that, when clicked, urge the message recipients to authenticate using a threat actor-generated device code, thereby allowing the adversary to hijack the authenticated session using the valid access token.

device-code-phishing

“During the attack, the threat actor generates a legitimate device code request and tricks the target into entering it into a legitimate sign-in page,” Microsoft explained. “This grants the actor access and enables them to capture the authentication—access and refresh—tokens that are generated, then use those tokens to access the target’s accounts and data.”

The phished authentication tokens can then be used to gain access to other services that the user already has permissions to, such as email or cloud storage, without the need for a password.

Microsoft said the valid session is used to move laterally within the network by sending similar phishing intra-organizational messages to other users from the compromised account. Furthermore, the Microsoft Graph service is used to search through messages of the breached account.

“The threat actor was using keyword searching to view messages containing words such as username, password, admin, teamviewer, anydesk, credentials, secret, ministry, and gov,” Redmond said, adding the emails matching these filter criteria were then exfiltrated to the threat actor.

To mitigate the risk posed by such attacks, organizations are recommended to block device code flow wherever possible, enable phishing-resistant multi-factor authentication (MFA), and follow the principle of least privilege.

Update

In an update shared on February 14, 2025, Microsoft said it “observed Storm-2372 shifting to using the specific client ID for Microsoft Authentication Broker in the device code sign-in flow.”

Using the client ID, it added, enables the attackers to receive a refresh token that can be used to request another token for the device registration service, and then register an actor-controlled device within Entra ID. The connected device is then used to harvest emails.

“With the same refresh token and the new device identity, Storm-2372 is able to obtain a Primary Refresh Token (PRT) and access an organization’s resources,” Microsoft said. “The actor has also been observed to use proxies that are regionally appropriate for the targets, likely in an attempt to further conceal the suspicious sign in activity.”

Cybersecurity firm Volexity said it has observed at least three different Russian threat actors conducting spear-phishing campaigns using the device code approach to compromise Microsoft 365 accounts since mid-January 2025.

Some of the emails have been identified as sent from accounts impersonating individuals from the United States Department of State, Ukrainian Ministry of Defence, European Union Parliament, and other prominent research institutions.

One of the clusters behind the activity is suspected to be APT29, which is also known as BlueBravo, Cloaked Ursa, CozyLarch, Cozy Bear, Midnight Blizzard (formerly Nobelium), and The Dukes. The other two groups have been assigned the monikers UTA0304 and UTA0307.

In one instance analyzed by Volexity, UTA0304 first approached a victim on Signal masquerading as an official from the Ukrainian Ministry of Defence, and then persuaded them to shift the conversation to another secure chat application called Element.

The attacker proceeded to send them a spear-phishing email, stating they needed to click on a link provided in the message to join a chat room. Clicking the link redirected the victim to a Microsoft page that asks for a device code in order to “allow access.”

Cybersecurity

“The message was a ploy to fool the user into thinking they were being invited into a secure chat, when in reality they were giving the attacker access to their account,” Volexity’s Charlie Gardner, Steven Adair, and Tom Lancaster said in an analysis.

“The generated Device Codes are only valid for 15 minutes once they are created. As a result, the real-time communication with the victim, and having them expect the ‘invitation,’ served to ensure the phish would succeed through timely coordination.

CozyLarch and UTA0307, likewise, are said to have adopted a similar strategy, urging victims to join a Microsoft Teams meeting to gain unauthorized access to the Microsoft 365 account, followed by exfiltrating documents of interest.

“It should be noted that it is possible this is the work of a single threat actor running multiple, different campaigns,” the researchers said, adding they are being tracked separately due to differences in the observed components.

“It appears that these Russian threat actors have made a concerted effort to launch several campaigns against organizations with a goal of simultaneously abusing this method before the targets catch on and implement countermeasures.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

How does mentorship impact a professional’s career longevity?

Microsoft’s “This Is An Xbox” Campaign Was Axed Because “It Didn’t Feel Like Xbox”

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Google Pixel Phone: How to Free up to 7GB of Storage

What Is the Best Garmin Watch Right Now? (2026)

TAGGED: Authentication, Cyber Attack, Cyber Security, Cybersecurity, enterprise security, hacking, Information security, Internet, Microsoft, network security, phishing, Threat Intelligence
Share This Article
Facebook Twitter Copy Link
Previous Article How the AI era has highlighted the importance of data quality
Next Article Elon Musk Breaks Silence After Woman Claimed She Is Mother Of His 13th Child
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

International Olympic Committee announces women only for female categories from 2028
World News
How does mentorship impact a professional’s career longevity?
Tech News
SpaceX IPO: Musk plans to allocate up to 30% of shares for retail investors
Business
Pakistan to convene with Saudi, Egypt and Turkey in hopes of de-escalating regional hostilities
World News
Growing Pressure On BTC: On-Chain Data Reveals Bitcoin’s Institutional Exodus
Crypto
Tiger Woods’ Mugshot 2026: See the Photo of the Golfer After His DUI Arrest
Celebrity
Microsoft’s “This Is An Xbox” Campaign Was Axed Because “It Didn’t Feel Like Xbox”
Gaming News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

Brussels unveils plans for a European Degree but struggles to explain why

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
Trump evokes more anger and fear from Democrats than Biden does from Republicans, AP-NORC poll shows
March 28, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?