Microsoft 365 Accounts Reportedly Breached After Hackers Exploit Legitimate Microsoft OAuth Feature

The surge in attempts to compromise Microsoft 365 accounts has been enabled by readily available phishing tools.

Advertisement
Written by Sucharita Ganguly, Edited by David Delima | Updated: 23 December 2025 12:44 IST
Highlights
  • Attackers trick users into approving access on real Microsoft pages
  • OAuth device code phishing surged sharply since September 2025
  • Both cybercriminals and state-linked actors reportedly use this technique

Successful attacks allow data theft and long-term account access

Photo Credit: Unsplash

Cybersecurity firm Proofpoint has warned of a sharp rise in attacks targeting Microsoft 365 enterprise accounts by abusing a legitimate Microsoft authentication feature. The campaigns bypass multifactor authentication without stealing passwords or one-time codes, instead tricking users into approving access on their own devices. Researchers say the activity has increased significantly since September 2025 and involves both financially motivated cybercriminals and state-aligned threat actors. The attacks mark a broader shift in phishing tactics, where attackers exploit trusted authentication workflows rather than traditional credential theft.

How Hackers Bypassed MFA Using Microsoft's OAuth Device Code Flow

According to a Proofpoint blog post, attackers are misusing Microsoft's OAuth 2.0 device authorisation flow, a feature designed for devices with limited input, such as smart TVs and IoT hardware. In these attacks, victims are said to receive phishing emails or messages that claim to require urgent verification, document access, or account security checks. The messages often include links or QR codes, the cybersecurity firm added.

Advertisement

When users click the links, they are shown a device code, which is falsely presented as a one-time password or security token, according to the report. Victims are then instructed to enter the code on Microsoft's legitimate device login page.

Proofpoint explains that once the user enters the code, Microsoft authorises an OAuth access token for an attacker-controlled application, immediately granting access to the victim's Microsoft 365 account.

Advertisement

Because the login happens on a real Microsoft domain, many phishing detection tools fail to detect the attack. Proofpoint said successful compromises allow attackers to steal data, move laterally across corporate systems, and maintain persistent long-term access. In some cases, stolen data is later used for extortion.

Proofpoint researchers have tracked multiple threat clusters using this technique. These include financially motivated groups such as TA2723, which uses lures related to salary updates, benefits notices, and shared documents.

Advertisement

The firm has also observed state-aligned activity, particularly from a suspected Russia-linked group it tracks as UNK_AcademicFlare. This group reportedly uses compromised government and military email accounts to build trust before launching device code phishing campaigns targeting government, academic, and transportation sectors in the US and Europe.

The surge has been enabled by readily available phishing tools. Proofpoint identified two main kits driving the campaigns, like SquarePhish2 and Graphish. SquarePhish2 automates the OAuth device authorisation flow and often uses QR codes, while Graphish enables phishing through Azure App Registrations and adversary-in-the-middle techniques.

Advertisement

Researchers noted that these tools lower the technical barrier and allow attackers to scale campaigns despite the short-lived nature of device codes.

Proofpoint said the widespread use of device code phishing is unusual and represents a clear evolution in attacker behaviour. Instead of bypassing multifactor authentication, attackers abuse authentication workflows themselves, making breaches harder to detect.

The company advised organisations to restrict or block device code authentication using Conditional Access policies, closely monitor OAuth activity, and train users never to enter unsolicited verification codes, even on legitimate login pages.

Microsoft reportedly did not respond to a request for comment on the findings.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement
Popular Mobile Brands
  1. OnePlus Nord CE 6, Nord CE 6 Lite Launched in India at These Prices
  2. Amazon Great Summer Sale Is Live: Best Tech Deals
  3. OnePlus Nord CE 6 Review
  4. Jio's Latest Device Enables Wireless Android Auto, CarPlay in Your Car
  5. OTT Releases This Week (May 4 - May 10): Dacoit, Lukkhe, Citadel Season 2, and More
  6. Xbox Will Share More on Project Helix Later This Year
  7. Motorola Razr Fold India Launch Date, Colours and More Details Announced
  8. Google Launches Fitbit Air as a Competitor to Whoop
  1. Microsoft Says It Will Share More on Project Helix, the Next-Gen Xbox Console, Later This Year
  2. Amazon Great Summer Sale 2026: Here Are the Best Deals on  Air Conditioners From Leading Brands
  3. Apple Could Discontinue Cheapest MacBook Neo Model Due to Rising DRAM Prices, Analyst Claims
  4. Apple Spotlights Four Swift Student Challenge Apps Ahead of WWDC 2026
  5. Fitbit Air Launched With Screenless Design, Round-the-Clock Heart Rate Tracking: Price, Specifications
  6. Scientists Reconsider Dark Matter Theory Amid Growing Cosmological Mysteries
  7. Google Health App Replaces Fitbit App as Company Brings Google Health Coach to India
  8. Pragmata Has Sold Over 2 Million Copies in 16 Days Since Launch, Capcom Announces
  9. Google Upgrades AI Mode, AI Overviews With Expert Advice and Link Previews
  10. Google Tensor G7 Chip's Codename, Key Details Revealed in New Leak; Expected to Debut With Pixel 12 Series in 2027
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.