NextFin

Threat Groups Exploit Microsoft 365 OAuth Device Code to Bypass MFA and Hijack Enterprise Accounts

NextFin News - Security researchers have revealed an alarming surge in sophisticated phishing campaigns targeting Microsoft 365 accounts through exploitation of the OAuth 2.0 device authorization flow. This technique, first observed in widespread campaigns since September 2025, allows attackers to hijack enterprise accounts by bypassing traditional multi-factor authentication (MFA) protections without needing to steal passwords or intercept authentication codes. Notably, the attackers exploit a legitimate Microsoft feature designed for devices with limited input capabilities, such as smart TVs and IoT hardware, by directing users to enter a device code on Microsoft's genuine verification page (microsoft.com/devicelogin), thereby granting unauthorized persistent access.

The key threat actors identified include the financially motivated group TA2723, which began deploying OAuth device code attacks in October 2025, and the Russia-aligned state-backed actor UNK_AcademicFlare, conducting campaigns since September. Both groups predominantly target high-value sectors such as government, military, think tanks, and higher education institutions across the United States and Europe. These sophisticated attacks rely on off-the-shelf phishing toolkits like SquarePhish2 and Graphish, which automate the credential delegation process via QR codes and leverage Azure App Registrations with reverse proxy setups to mask malicious activity under legitimate enterprise applications.

The mechanics of the attack hinge on sophisticated social engineering. Victims receive emails masquerading as security notifications—using plausible hooks like salary updates, benefits notices, or document sharing requests—and are prompted to enter device codes on genuine Microsoft portals. Because authentication occurs on legitimate domains, standard phishing protections such as URL filtering and user vigilance on domain authenticity are circumvented. Successful exploits yield refresh tokens, enabling attackers indefinite account access for data exfiltration, lateral movement within networks, and long-term organizational compromise.

The implications of this emerging threat vector are profound for enterprise security architectures. The device code flow is a standard Microsoft OAuth feature essential for the operation of many legitimate devices. Consequently, Microsoft faces a critical dilemma: outright disabling this authentication flow would disrupt legitimate device operations, including conference room systems and smart display devices. Traditional patch-based or domain-blocking mitigations are ineffective due to the attack's abuse of genuine authentication infrastructure.

Security experts advise organizations to implement Conditional Access policies leveraging the "Authentication Flows" condition to selectively restrict or block device code flow authentications to approved users, trusted devices, and designated IP ranges. Furthermore, mandating sign-ins exclusively from compliant or registered devices provides additional layered defense. Beyond technical controls, evolving user awareness programs are critical since users must be trained to recognize the unique risks of authorizing device access codes on legitimate sites, not merely avoid suspicious URLs.

This proliferation marks a strategic evolution from traditional phishing tactics targeting credential theft toward exploitation of trusted, third-party authorization workflows intrinsic to modern cloud ecosystems, particularly Microsoft 365. The widespread availability of automation toolkits like SquarePhish2 and Graphish has industrialized these attacks, lowering the bar for threat actors and broadening the attack surface. Both financially motivated and state-sponsored groups have moved from bespoke, targeted intrusions to large-scale campaigns, substantially increasing the odds of compromises across enterprises globally.

Looking forward, the rise of OAuth device code abuse signals a paradigm shift in cloud identity security challenges. Organizations must anticipate a growing trend in attacks that exploit legitimate authentication flows rather than relying solely on password or token interception. As attackers refine social engineering lures—leveraging mobile endpoints through SMS and QR codes where traditional security visibility is limited—the attack vectors will diversify and intensify.

To stay ahead, enterprises should enhance threat detection capabilities with continuous monitoring of OAuth authorizations and refresh token issuance, employing analytics to flag anomalous authorization patterns. Coordinated security policies across endpoint, identity, and network layers will become imperative. Moreover, Microsoft's ecosystem stakeholders must innovate technical safeguards that preserve device code functionality for legitimate use while enabling granular enforcement to thwart abuse. Failure to adapt swiftly risks extensive data breaches, prolonged network intrusions, and erosion of trust in fundamental cloud identity infrastructure.

In sum, this emerging malware-free attack method utilizing OAuth device code exploitation represents a formidable challenge to modern enterprise cybersecurity, requiring vigilant, adaptive, and holistic defense postures under the leadership of U.S. President and international cybersecurity collaboration.

Explore more exclusive insights at nextfin.ai.

Open NextFin App