Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要快速阅读并理解文章内容。 文章讲的是一个疑似与俄罗斯有关的网络攻击集团,他们利用钓鱼邮件和设备代码认证流程来窃取微软365的凭证,进而接管账户。攻击目标包括政府、军事组织等,时间从2025年9月开始,由Proofpoint追踪。 接下来,我需要提取关键信息:攻击者是谁,使用了什么方法,目标是什么,以及影响范围。然后用简洁的语言把这些点整合起来,确保不超过100字。 还要注意不要使用“文章内容总结”这样的开头,直接描述内容。可能的结构是:攻击者、方法、目标、影响和建议措施。 最后检查一下字数和表达是否清晰准确。 </think> 一个疑似与俄罗斯相关的网络攻击集团利用钓鱼邮件和设备代码认证流程窃取微软365凭证,并针对政府、军事、教育和交通等领域的机构发起账户接管攻击。该活动自2025年9月起持续至今,并通过伪装成合法链接诱骗用户授权访问。 2025-12-19 17:54:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

Cybersecurity / Cloud Security

A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal victims' Microsoft 365 credentials and conduct account takeover attacks.

The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare.

The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe.

"Typically, these compromised email addresses are used to conduct benign outreach and rapport building related to the targets' area of expertise to ultimately arrange a fictitious meeting or interview," the enterprise security company said.

Cybersecurity

As part of these efforts, the adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click "Next" to access the supposed document.

However, doing so redirects the user to the legitimate Microsoft device code login URL, where, once the previously provided code is entered, it causes the service to generate an access token that can then be recovered by the three actors to take control of the victim account.

Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. Over the past couple of months, Amazon Threat Intelligence and Volexity have warned of continued attacks mounted by Russian threat actors by abusing the device code authentication flow.

Proofpoint said UNK_AcademicFlare is likely a Russia-aligned threat actor given its targeting of Russia-focused specialists at multiple think tanks and Ukrainian government and energy sector organizations.

Data from the company shows that multiple threat actors, both state-aligned and financially-motivated, have latched onto the phishing tactic to deceive users into giving them access to Microsoft 365 accounts. This includes an e-crime group named TA2723 that has used salary-related lures in phishing emails to direct users to fake landing pages and trigger device code authorization.

Cybersecurity

The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish.

"Similar to SquarePhish, the tool is designed to be user-friendly and does not require advanced technical expertise, lowering the barrier for entry and enabling even low-skilled threat actors to conduct sophisticated phishing campaigns," Proofpoint said. "The ultimate objective is unauthorized access to sensitive personal or organizational data, which can be exploited for credential theft, account takeover, and further compromise."

To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html
如有侵权请联系:admin#unsafe.sh