Particle.news
Download on the App Store

Microsoft Warns of AI-Driven Device-Code Phishing Taking Over Accounts Daily

Live device codes plus automation bypass multi-factor checks to seize Microsoft 365 access.

Overview

  • Microsoft says ongoing campaigns are compromising hundreds of organizations each day across sectors worldwide.
  • The scheme exploits OAuth’s device code login by tricking users to enter a short code at the real Microsoft site, which authorizes the attacker’s session without needing the victim’s password.
  • Attackers spend 10–15 days on reconnaissance, using the GetCredentialType API to confirm active accounts, then send AI-tailored lures such as invoices, RFPs, and voicemail notices.
  • Redirect chains through compromised domains and trusted serverless hosts end on a page that generates a live device code, stretching the usual 15‑minute limit and yielding an access token once the user completes MFA.
  • After entry, intruders often register a device to get a long‑lived refresh token, set inbox rules, and auto‑exfiltrate finance emails, and Microsoft urges blocking device‑code flow where possible along with stronger training and monitoring.