Access granted: phishing with device code authorization for account takeover

Dec. 21, 2025, 7:39 p.m.

Description

Multiple threat clusters, including state-aligned and financially-motivated actors, are utilizing phishing tools to trick users into granting access to Microsoft 365 accounts via OAuth device code authorization. This technique leads to account takeovers, data exfiltration, and further compromises. Threat actors are leveraging the OAuth 2.0 device authorization grant flow to gain unauthorized access by approving various applications. Campaigns often begin with an initial message containing a URL, which initiates an attack sequence using Microsoft's legitimate device authorization process. Tools like SquarePhish2 and Graphish are being used to facilitate these attacks. Both cybercriminal groups and state-aligned actors have adopted this technique, with Russia-aligned threat actors being particularly active.

Date

  • Created: Dec. 18, 2025, 1:28 p.m.
  • Published: Dec. 18, 2025, 1:28 p.m.
  • Modified: Dec. 21, 2025, 7:39 p.m.

Indicators

  • 196.251.80.184
  • www.myfilepass.com
  • https://portal.msprogresssharefile.cloud/
  • https://sharefile.progressivesharepoint.top/
  • https://clientlogin.blitzcapital.net/
  • www.vaultaliy.com
  • www.renewauth.com
  • no-reply.doc333@ksmus.virtoshare.com

Attack Patterns

Additional Informations

  • Energy
  • Education
  • Transport
  • Government and administrations
  • Defense
  • nebulafiles.com
  • acxioswan.com
  • vaultally.com
  • clientlogin.blitzcapital.net
  • spacesdocs.com
  • filetix.com
  • docifytoday.com
  • renewauth.com
  • magnavite.com
  • vxhwuulcnfzlfmh.live
  • portal.msprogresssharefile.cloud
  • acxishare.com
  • 97d7e46b-1bff-4f24-b262-8b0b3914d88a.us5.azurecomm.net
  • novodocument.com
  • bluecubecapital.com
  • xgjtvyptrjlsosv.live
  • myfilepass.com
  • confidentfiles.com
  • sharefile.progressivesharepoint.top
  • collabodex.com
  • infoldium.com
  • Zambia
  • United States of America
  • Ukraine