Surge of OAuth Device Code Phishing Attacks Targets M365 Accounts
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。我得先仔细看看这篇文章讲了什么。 文章主要讲的是微软的OAuth 2.0设备授权流程被滥用的情况。攻击者包括来自俄罗斯和中国的威胁集团,他们从九月份开始大量使用设备代码钓鱼攻击,导致用户泄露M365账户信息,甚至被接管账户。研究人员注意到这种攻击手法虽然不是全新的,但最近变得越来越普遍。 用户的需求是用中文总结内容,控制在100字以内。我需要抓住关键点:攻击者是谁、使用了什么方法、影响是什么。同时,语言要简洁明了,避免复杂的句子结构。 可能的难点是如何在有限的字数内涵盖所有重要信息。我需要筛选出最重要的部分,比如攻击者的背景、攻击手法、以及带来的风险。 最后,确保总结准确且符合用户的要求,不使用“文章内容总结”之类的开头词。 </think> 微软的OAuth 2.0设备授权流程被滥用,攻击者通过设备代码钓鱼诱骗用户授予访问权限,导致M365账户被接管和数据泄露。此类攻击由多国关联的威胁集团实施,利用社会工程学手段诱导用户输入看似合法的代码,并结合恶意工具如SquarePhish和Graphish展开大规模钓鱼活动。 2025-12-19 22:36:11 Author: securityboulevard.com(查看原文) 阅读量:1 收藏

A range of state-sponsored and financially motivated threat groups are abusing Microsoft’s OAuth 2.0 device authorization grant flow to trick users into giving them access into their M365 accounts.

The bad actors, which include Russia- and China-linked groups, are driving a surge since September in the use of device code phishing to convince victims to log into an applications with legitimate credentials using Microsoft’s OAuth 2.0 service, which generates a token that the hacker can steal and can lead to a takeover of the M365 account, data exfiltration, and other threats, according to researchers with Proofpoint threat research team.

The researchers had seen threat actors using device code phishing in the past, but the technique’s widespread use since September is “highly unusual,” they wrote in a report this week. “While this is not necessarily a novel technique, it is notable to see it used increasingly by multiple threat clusters.”

“From the use of malicious OAuth applications for persistent access to the abuse of legitimate Microsoft authentication flows with device codes, threat actors’ tactics to achieve account takeover are evolving with quick adoption across the threat landscape,” they wrote. “These campaigns rely heavily on social engineering, most often using lures with embedded URLs or QR codes to trick users into thinking they are securing their accounts.”

A Rise in Such Attacks

Other vendors also are expecting to see more bad actors embrace device code phishing more. In a blog post earlier this year, Alistair Greaves, director of red team operations for Bugcrowd, wrote that there several reasons for this.

“First, as organizations become more aware of traditional phishing techniques (e.g., fake login pages and credential stuffing), adversaries must find new ways to bypass existing security controls,” Greaves wrote. “Although device code phishing is a relatively old technique … it still offers a stealthier alternative. This is because it does not require victims to input credentials into a fake login page, which can often be detected by trained users or security tools.”

Users instead are lured into entering what seems like a legitimate code in a well-known Microsoft authentication portal, which makes it more difficult to see it as a phishing attempt. It also relies heavily on the behavior of users who’ve grown used to authentication prompts for collaborative tools, making them less likely to question a request for device code authorization.

In addition, the scheme can be executed via email, SMS, a phone call, or within collaborative tools or external chat services, he wrote.

QR Codes, Hyperlinked Text, and Buttons

In the most recent case, Proofpoint researchers wrote that the campaigns start with a message with a URL embedded behind a button, as hyperlinked text, or in a QR code. The attack sequence is kicked off when a user hits the URL and initiates the legitimate Microsoft device authorization process.

“Once initiated, the user is presented with a device code,” they wrote. “It is either presented directly on the landing page or received in a secondary email from the threat actor. The lures typically claim that the device code is an OTP [opt-in computing] and direct the user to input the code at Microsoft’s verification URL. Once the user inputs the code, the original token is validated, giving the threat actor access to the targeted M365 account.”

The message can differ based on the campaign, with some saying they are token re-authorization notifications and others using different lures.

SquarePhish, Graphish Tools Used

The campaigns tend to use two different tools, SquarePhish was first published in 2022 by Secureworks, then a Dell company, and last year, an independent researcher published SquarePhish2 on GitHub. SquarePhish uses a QR code directs users to a website hosted on a SquarePhish2 server and kicks off an attack that initiates the OAuth device authorization grant flow.

Scammers also are using the Graphish phishing kit, which is shared on dark web hacking forums that can create convincing phishing pages using the Azure App Registrations and reverse proxy setups. It can launch adversary-in-the-middle (AiTM) attacks and OAuth-based phishing attempts.

Proofpoint tracked several campaigns, including one on December 8 that used a shared document reminder alert to lure users into clicking a Google Share URL hyperlinked as text to access a fake document called “Salary Bonus + Employer Benefit Reports 25.” Clicking on the URL sends the victim to a website controlled by the bad actor and prompts the user to input their email address. Doing so leads to a prompt to complete authentication that includes a code that, once put into the Microsoft-provided OAuth page gives the attacker access to the user’s M365 account.

TA2723 on the Attack

A financially motivated threat group, TA2723, in campaigns starting in October with a message that appeared to be a corporate notice regarding an amended salary. The message was “customized to show the recipient’s name and the name of the shared file, consistent with the subject line. The message contained a virtoshare.com URL embedded as a ‘button’ to Open the file,” the researchers wrote.

The victim is enticed to click on the button, which sets off a chain where they are redirected to Microsoft’s legitimate device authorization page where they end up authorizing access to the attacker-controlled application. The researchers suspect that both SquarePhish2 and Graphish were used by TA2723 in its attacks.

Russia, China Groups Using Tactic

Nation-state groups are increasingly using phishing techniques – like OAuth device code authorization – that don’t need passwords, a tactic used mostly by Russian-linked criminals, they said, noting a report earlier this year from Veloxity.

“State-aligned threat actors often conduct patient rapport building via benign outreach prior to a device code phishing attempt, with some campaigns showing evidence of multi-channel targeting via both email and other communication channels,” Proofpoint researchers wrote.

They point to a Russian group dubbed UNK_AcademicFlare using compromised email addresses from government and military organizations to target governments, think tanks, higher education, and transportation entities in the United States and the UK. The campaign uses a spoofed OneDrive accounts to kick off a device code phishing workflow.

Recent Articles By Author


文章来源: https://securityboulevard.com/2025/12/surge-of-oauth-device-code-phishing-attacks-targets-m365-accounts/
如有侵权请联系:admin#unsafe.sh