Security

Device Code Phishing: AI-Driven Campaign Escalates

3 min read

Summary

Microsoft Defender Security Research detailed a large-scale phishing campaign that abuses the OAuth device code flow using AI-generated lures, dynamic code generation, and automated backend infrastructure. The campaign raises the risk for organizations because it improves attacker success rates, bypasses traditional detection patterns, and enables token theft, inbox rule persistence, and Microsoft Graph reconnaissance.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Introduction

Microsoft has disclosed a major evolution in device code phishing, showing how attackers are combining generative AI, automation, and cloud-hosted infrastructure to compromise Microsoft accounts at scale. For security teams and Microsoft 365 administrators, this matters because the campaign targets legitimate authentication flows rather than stealing passwords directly, making it harder to detect with traditional controls.

What’s new in this campaign

According to Microsoft Defender Security Research, the activity builds on earlier device code phishing tradecraft but adds several important advances:

  • AI-enabled phishing lures: Attackers used generative AI to create highly personalized emails tied to job roles and business scenarios such as invoices, RFPs, and manufacturing workflows.
  • Dynamic device code generation: Instead of relying on pre-generated codes that expire in 15 minutes, the device code is created only when the user clicks the phishing link.
  • Automated cloud infrastructure: Threat actors used platforms such as Railway, Vercel, Cloudflare Workers, and AWS Lambda to deploy short-lived infrastructure and redirect chains.
  • Blended-in traffic: Redirects through trusted cloud services help the activity avoid simple blocklists and reputation-based defenses.
  • Post-compromise token abuse: Once a victim completes the device login flow, attackers use the token for email exfiltration, inbox rule creation, and Microsoft Graph reconnaissance.

Why this is different

Traditional phishing usually tries to capture credentials. In this case, the attacker tricks the user into approving a legitimate Microsoft device login session that the attacker initiated. Because the authentication happens on Microsoft’s real device login page, users may be less suspicious, and MFA can be less effective if the session is not strongly bound to the original context.

Microsoft also links this trend to EvilToken, a phishing-as-a-service toolkit driving broader device code abuse. The use of automation and AI marks a significant step up from the Storm-2372 campaign documented in 2025.

Impact on IT administrators

Security and identity teams should expect:

  • More convincing phishing emails targeting high-value users
  • Increased abuse of legitimate OAuth and Microsoft sign-in flows
  • Token-based compromise without password theft
  • Persistence through malicious inbox rules and hidden mail redirection
  • Reconnaissance against organizational structure via Microsoft Graph

Administrators should review Microsoft’s mitigation guidance and prioritize:

  • Monitoring for suspicious device code authentication activity
  • Investigating unexpected inbox rules and token-based access patterns
  • Hardening conditional access and sign-in risk policies where possible
  • Training users to treat unsolicited device login prompts as suspicious
  • Hunting for suspicious redirects, impersonation domains, and cloud-hosted phishing infrastructure

This research is a reminder that phishing defenses must now account for legitimate authentication workflows being abused, not just fake login pages and stolen passwords.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

device code phishingMicrosoft DefenderOAuthtoken theftphishing

Related Posts

Security

@antv npm Attack Hits CI/CD Secrets and Tokens

Microsoft has disclosed an active supply chain attack involving compromised @antv npm packages that used malicious preinstall scripts to steal credentials from GitHub Actions and other CI/CD environments. The campaign matters because it spread through popular downstream dependencies, putting developer pipelines, cloud secrets, and software supply chains at risk.

Security

Microsoft Gaming Security: Key Risks and Defenses

Microsoft’s latest Deputy CISO post explains why securing gaming requires a different approach than traditional enterprise IT. The company outlines the distinct risks across gaming platforms, studios, and shared central teams, and highlights how Entra ID, Purview, Defender for Cloud, and Sentinel help balance security with player experience and developer agility.

Security

Microsoft RAMPART and Clarity Open-Sourced

Microsoft has open-sourced RAMPART and Clarity, two tools aimed at improving safety in agentic AI development. RAMPART brings repeatable adversarial and regression testing into CI pipelines, while Clarity helps teams challenge design assumptions early before code is written.

Security

Fox Tempest Malware Signing Service Disrupted

Microsoft has disrupted Fox Tempest, a malware-signing-as-a-service operation that helped cybercriminals make ransomware and other malware appear legitimately signed. The takedown matters because the group abused Microsoft Artifact Signing, created more than 1,000 fraudulent certificates, and enabled attacks that could bypass security controls more easily.

Security

Storm-2949 Cloud Breach: Entra ID to Azure Attack

Microsoft detailed how Storm-2949 turned a socially engineered Microsoft Entra ID compromise into broad data theft across Microsoft 365 and Azure. The case highlights how identity attacks can escalate quickly through legitimate cloud management features, making stronger MFA controls, monitoring, and cross-platform detections critical for defenders.

Security

Microsoft Security for SMBs in an AI-Powered World

Microsoft is urging small and medium businesses to treat cybersecurity as a core business risk as AI makes phishing, malware, and identity attacks faster and more effective. The company highlights Microsoft 365 Business Premium and integrated security controls as a practical way for growing businesses to protect users, devices, email, and cloud apps without adding major complexity.