Microsoft OAuth Mayhem: Phishing Surge Targets M365 Accounts with Clever QR Code Cons
Proofpoint warns of a rise in phishing campaigns abusing Microsoft’s OAuth device code authorization flow. Threat actors, from state-aligned to financially motivated, trick users into approving malicious apps, leading to account takeovers. With QR codes and sneaky tactics, these actors are phishing their way to unauthorized Microsoft 365 account access.

Hot Take:
It’s official, folks! Hackers have decided that the only thing more secure than your grandmother’s cookie jar is your Microsoft 365 account. Who knew that OAuth, the superhero of authentication, would become the villain in this plot twist worthy of a daytime soap opera? But don’t worry, because QR codes and hyperlinked texts are here to save the day… or at least make your life a tad more inconvenient. Stay tuned as the world of cybersecurity continues to turn faster than a hamster on a wheel!
Key Points:
- Phishing campaigns are now exploiting Microsoft’s OAuth device code authorization flow to access Microsoft 365 accounts.
- Both financially motivated and state-aligned threat actors are involved, using social engineering techniques.
- The attacks use OAuth 2.0 device authorization grants, tricking users into giving access via device codes.
- Tools like SquarePhish2 and Graphish are making it easier for hackers to deploy these techniques.
- Organizations are urged to fortify OAuth controls and educate users on the risks of untrusted device codes.
