Phishy Business: Russia-Aligned Hackers Reel in Microsoft 365 Credentials with Clever Scams!
Device code phishing is back, and it’s no laughing matter. A suspected Russia-aligned group, UNK_AcademicFlare, is targeting Microsoft 365 accounts using clever tactics like fake meetings and device code authentication workflows. To counter this, experts suggest creating a Conditional Access policy or an allow-list approach to block these sophisticated phishing attempts.

Hot Take:
Who knew that phish could be so slippery? In the digital ocean, it seems like our little Microsoft 365 credentials are the catch of the day for Russia-aligned cyber fishers. Grab your nets, folks, because this is one phishing expedition you don’t want to get caught in!
Key Points:
- Russia-aligned group UNK_AcademicFlare is behind a phishing campaign targeting Microsoft 365 credentials.
- The attacks use compromised email addresses from government and military organizations.
- Phishing links lead to fake Microsoft OneDrive pages, tricking users into providing authentication codes.
- Device code phishing is a known tactic, previously documented by major cybersecurity players.
- Prevention includes creating Conditional Access policies to block unauthorized device code flows.
Already a member? Log in here
