Microsoft 365 Accounts Reportedly Breached After Hackers Exploit Legitimate Microsoft OAuth Feature

The surge in attempts to compromise Microsoft 365 accounts has been enabled by readily available phishing tools.

Advertisement
Written by Sucharita Ganguly, Edited by David Delima | Updated: 23 December 2025 12:44 IST
Highlights
  • Attackers trick users into approving access on real Microsoft pages
  • OAuth device code phishing surged sharply since September 2025
  • Both cybercriminals and state-linked actors reportedly use this technique

Successful attacks allow data theft and long-term account access

Photo Credit: Unsplash

Cybersecurity firm Proofpoint has warned of a sharp rise in attacks targeting Microsoft 365 enterprise accounts by abusing a legitimate Microsoft authentication feature. The campaigns bypass multifactor authentication without stealing passwords or one-time codes, instead tricking users into approving access on their own devices. Researchers say the activity has increased significantly since September 2025 and involves both financially motivated cybercriminals and state-aligned threat actors. The attacks mark a broader shift in phishing tactics, where attackers exploit trusted authentication workflows rather than traditional credential theft.

How Hackers Bypassed MFA Using Microsoft's OAuth Device Code Flow

According to a Proofpoint blog post, attackers are misusing Microsoft's OAuth 2.0 device authorisation flow, a feature designed for devices with limited input, such as smart TVs and IoT hardware. In these attacks, victims are said to receive phishing emails or messages that claim to require urgent verification, document access, or account security checks. The messages often include links or QR codes, the cybersecurity firm added.

When users click the links, they are shown a device code, which is falsely presented as a one-time password or security token, according to the report. Victims are then instructed to enter the code on Microsoft's legitimate device login page.

Advertisement

Proofpoint explains that once the user enters the code, Microsoft authorises an OAuth access token for an attacker-controlled application, immediately granting access to the victim's Microsoft 365 account.

Advertisement

Because the login happens on a real Microsoft domain, many phishing detection tools fail to detect the attack. Proofpoint said successful compromises allow attackers to steal data, move laterally across corporate systems, and maintain persistent long-term access. In some cases, stolen data is later used for extortion.

Proofpoint researchers have tracked multiple threat clusters using this technique. These include financially motivated groups such as TA2723, which uses lures related to salary updates, benefits notices, and shared documents.

Advertisement

The firm has also observed state-aligned activity, particularly from a suspected Russia-linked group it tracks as UNK_AcademicFlare. This group reportedly uses compromised government and military email accounts to build trust before launching device code phishing campaigns targeting government, academic, and transportation sectors in the US and Europe.

The surge has been enabled by readily available phishing tools. Proofpoint identified two main kits driving the campaigns, like SquarePhish2 and Graphish. SquarePhish2 automates the OAuth device authorisation flow and often uses QR codes, while Graphish enables phishing through Azure App Registrations and adversary-in-the-middle techniques.

Advertisement

Researchers noted that these tools lower the technical barrier and allow attackers to scale campaigns despite the short-lived nature of device codes.

Proofpoint said the widespread use of device code phishing is unusual and represents a clear evolution in attacker behaviour. Instead of bypassing multifactor authentication, attackers abuse authentication workflows themselves, making breaches harder to detect.

The company advised organisations to restrict or block device code authentication using Conditional Access policies, closely monitor OAuth activity, and train users never to enter unsolicited verification codes, even on legitimate login pages.

Microsoft reportedly did not respond to a request for comment on the findings.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement
Popular Mobile Brands
  1. Poco X8 Pro Series Price, Colours Inadvertently Listed on Xiaomi's Website
  2. WhatsApp Will Soon Let You Add a 'Close Friends' Status, Just Like Instagram
  1. Curiosity Rover Reconnects After Solar Conjunction, Begins Critical Organic Search on Mars
  2. Impossible Neutrino Detected on Earth May Come From an Exploding Primordial Black Hole
  3. WhatsApp Will Soon Let You Add a 'Close Friends' Status, Just Like Instagram: Report
  4. Poco X8 Pro Series Price, Colourways Inadvertently Listed on Xiaomi Website in Europe: Expected Specifications
  5. Itel A100 Confirmed to Launch in India Soon; Colourways, Battery Capacity and Durability Teased
  6. Google's February 2026 Discover Core Update to Focus on Local Content, Reduce Clickbait
  7. Apple Eyes Retail Expansion in India, New Job Listings Hint at Apple Store in Hyderabad
  8. After The Last of Us, HBO Is Adapting Baldur's Gate 3 for TV With Craig Mazin as Creator
  9. Oppo Find N6 China Launch Timeline, Durability Improvements Teased: Expected Features, Specifications
  10. GPT-5.3-Codex Released as OpenAI’s First AI Model to Assist in Its Own Development
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.