February 15th, 2025

Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication

Russian threat actors are conducting politically themed phishing campaigns targeting Microsoft 365 accounts via Device Code Authentication. Volexity identifies three distinct groups, emphasizing the need for increased awareness of these tactics.

Read original articleLink Icon
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication

Volexity has reported that multiple Russian threat actors are conducting social-engineering and spear-phishing campaigns aimed at compromising Microsoft 365 accounts through Device Code Authentication phishing. This method, which is less recognized by users, has been particularly effective in recent attacks that began in mid-January 2025. The campaigns have been politically themed, often impersonating officials from the U.S. Department of State, the Ukrainian Ministry of Defence, and the European Union Parliament. Attackers typically invite targets to join Microsoft Teams meetings or access applications as external users, using tailored emails that lead to the Microsoft Device Code authentication page. Volexity has identified at least three distinct threat actors, including CozyLarch, UTA0304, and UTA0307, with CozyLarch linked to campaigns impersonating the U.S. Department of State. The phishing emails often contain links that redirect users to the Device Code authentication page, where entering a code grants attackers long-term access to the accounts. Volexity's investigations revealed that these attacks often involved real-time communication with victims to ensure timely execution of the phishing attempts. The report emphasizes the need for heightened awareness regarding these sophisticated phishing techniques, particularly as they exploit current political events to enhance their effectiveness.

- Russian threat actors are targeting Microsoft 365 accounts through Device Code Authentication phishing.

- Campaigns have been politically themed, impersonating officials from various organizations.

- Volexity tracks at least three distinct threat actors involved in these campaigns.

- The phishing method is effective due to its atypical workflow, making it less recognizable to users.

- Real-time communication with victims is used to increase the success rate of the attacks.

Link Icon 9 comments
By @HenryBemis - 7 days
Fun fact (which is a fact but not fun at all): every org that has SharePoint has enormous critical/sensitive data all over the place. Anything from trade secrets, future plans, passwords, personal data, etc. So compromising 'one account' means that someone can start roaming on the intranet, start searching for keywords ('password:', 'passport ID', 'home address', 'home number', 'driver's license', etc.) and will collect all the data they need for further attacks.
By @ChrisArchitect - 7 days
By @dist-epoch - 7 days
> All authentication and download events came from virtual private server (VPS) and Tor IP addresses, which is not the most subtle way to access an account.

If I login from my computer and a few hours later an attacker logs in from the other side of the planet, most big providers will trigger extra checks/email notifications of unusual events.

I wonder if intentionally using Tor/VPS is a way to bypass those checks, since a Tor/VPS can have a far away geo-IP.

By @gloosx - 6 days
Your whole M$ account and all data behind six digits. People are so used to EVERY service asking them these digits, they don't even think twice before just hitting them in.

The Era of Login/Password Security was much more secure anyway, dunno why we regressed to this. Because printer needs your microsoft account now?

By @antithesis-nl - 7 days
Yeah, can confirm, there are a lot of targeted emails going out inviting people to dodgy auth flow endpoints.

Disabling device authentication (which is rarely needed anyway) and forcing Microsoft Authenticator (with the yes-this-is-really-me number entry thing) or something like a Yubikey should make your org like 99% less vulnerable. If you're not on a Microsoft-or-similar platform (good for you!), one word of advice: passkeys.

As for the inevitable "who would fall for this" question: prior to 2017, when Google instituted a strict 2FA policy, even members of their elite security team were successfully phished. After that, not so much: https://krebsonsecurity.com/2018/07/google-security-keys-neu...

By @smw - 7 days
Why doesn't this flow require the user to fully login before _requesting_ a device code?
By @FpUser - 7 days
>"United States Department of State, Ukrainian Ministry of Defence, European Union Parliament"

What kind of bright mind would consider not moving unsolicited emails like these straight to a dust bin?