DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Microsoft 365 Accounts Targeted by Device Code Phishing

DigitalCIO Bureau by DigitalCIO Bureau
December 23, 2025
in Tech News
0
Retail Industry — Next Big Target for Hackers?
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Social engineering remains an effective method for threat actors to trick users into performing unwanted actions, such as installing applications or sharing sensitive information. One specific technique, device code phishing, is now widely used to gain access to Microsoft 365 accounts.

Proofpoint researchers warn that this approach, previously primarily used in targeted red team activities, has been part of broader campaigns since September 2025. The security company calls it a significant shift in the threat landscape.

Device code disguised as a one-time password

Device code phishing often begins with a message containing a URL hidden in a button, hyperlink, or QR code. When a user follows the link, the authorization process for Microsoft devices begins. The user then receives a device code, presented as a one-time password (OTP). The instruction is to enter this code on Microsoft’s official verification page. Once this is done, the attacker validates the associated token and thus gains access to the account.

Phishing attacks are carried out in various ways. In some cases, attackers claim to require token reauthorization, while in others, they deploy false warnings about account security.

Various tools available

Both state-sponsored and financially motivated threat actors are using these attacks, including the well-known group TA2723. Malicious applications and tools are being sold on hacking forums that make it easier for attackers to scale up campaigns, such as SquarePhish, SquarePhishV2, and Graphish. These tools help bypass the limited validity period of device codes, making campaigns possible on a larger scale than ever before.

Successful device code phishing attacks lead to complete control of M365 accounts, posing risks such as data theft, lateral movement within networks, and persistent access. Proofpoint emphasizes the importance of stricter OAuth controls and increasing user awareness of these evolving threats. The company expects OAuth authentication abuse to continue to increase, particularly with the introduction of FIDO-compliant multi-factor authentication (MFA).

Tags: Microsoft 365
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

21-year-old from China wins TCS CodeVita 2026 as TCS sets new Guinness World Records for the world’s largest coding competition

by DigitalCIO Bureau
February 27, 2026
0
21-year-old from China wins TCS CodeVita 2026 as TCS sets new Guinness World Records for the world’s largest coding competition

TCS sets a new milestone with 146,922 participants, surpassing its 2021 Guinness World Records title to remain the world’s largest coding championship Tata Consultancy Services (TCS) announced the winners...

Read moreDetails

Qualcomm and Tata Electronics Partner to Manufacture Qualcomm Automotive Modules in India

by DigitalCIO Bureau
February 27, 2026
0
Qualcomm and Tata Electronics Partner to Manufacture Qualcomm Automotive Modules in India

Collaboration supports the nation’s “Make in India” initiative and global priority for supply chain diversification Companies’ manufacturing partnership aimed at supporting Indian and global automakers, strengthening supply-chain flexibility...

Read moreDetails

Fractal Launches PiEvolve, an Evolutionary Agentic Engine for Autonomous Machine Learning and Scientific Discovery

by DigitalCIO Bureau
February 27, 2026
0
Fractal Launches PiEvolve, an Evolutionary Agentic Engine for Autonomous Machine Learning and Scientific Discovery

Ranks among the top-performing agents on OpenAI’s MLE-Bench and sets new performance milestones Fractal (www.fractal.ai) announced the launch of PiEvolve, an evolutionary, agentic engine designed for autonomous machine...

Read moreDetails

LTM to Modernize India’s Tax Analytics Platform Leveraging NVIDIA AI Technology

by DigitalCIO Bureau
February 27, 2026
0
LTM to Modernize India’s Tax Analytics Platform Leveraging NVIDIA AI Technology

LTM (Name change from LTIMindtree, subject to shareholder approval) announced it is collaborating with NVIDIA to support the Central Board of Direct Taxes (CBDT) in modernizing India’s national tax analytics platform...

Read moreDetails

Securonix Introduces Agentic Mesh and the First Productivity-Based AI Model for the SOC

by DigitalCIO Bureau
February 26, 2026
0
Securonix Introduces Agentic Mesh and the First Productivity-Based AI Model for the SOC

Powered by Sam, the AI SOC Analyst, the Securonix Agentic Mesh delivers governed, explainable AI that measurably improves SOC productivity and enables board-ready outcomes. Securonix, Inc., in collaboration...

Read moreDetails
Next Post
Barracuda Introduces ‘Barracuda Research

Barracuda Research Identifies GhostFrame Phishing Kit

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Gartner Identifies Strategic Trends In Software Engineering For 2025

Gartner Identifies Strategic Trends In Software Engineering For 2025

July 2, 2025

Japan to lead development of SWIFT network for cryptocurrency

July 19, 2019

Uber manager’s warnings could have prevented the fatal self-driving car crash

December 13, 2018

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?