Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit OAuth to Steal Microsoft 365 Credentials

Hackers Exploit OAuth to Steal Microsoft 365 Credentials

Posted on May 15, 2026 By CWS

Cybercriminals have found a way to exploit Microsoft’s OAuth device authorization flow to steal credentials from Microsoft 365 accounts, posing a significant threat to organizations worldwide. This technique, which takes advantage of a legitimate security feature, has been increasingly used since late 2024, leaving many security teams unprepared.

The Rise of Device Code Phishing

Device code phishing has become a prominent method for identity theft, evolving from a little-known tactic to a common tool in the cybercriminal arsenal. Proofpoint analysts reported in early 2025 that numerous campaigns have been launched targeting businesses across various sectors. These campaigns utilize device code phishing to obtain unauthorized access to Microsoft 365 accounts.

By leveraging the OAuth 2.0 device authorization flow, attackers can impersonate trusted Microsoft services, making it difficult for traditional security measures to detect these attacks. The technique involves directing victims to legitimate Microsoft pages where they unknowingly authorize access to their accounts by entering a provided code.

Understanding the Attack Method

Device code phishing specifically exploits devices with limited input capabilities, such as smart TVs and gaming consoles, to trick users into entering malicious codes. Attackers deliver these codes via emails containing PDF attachments or URLs that lead to the official Microsoft login page. Once the code is entered within the session window, hackers gain access to authentication tokens, allowing them to maintain control over the account even if passwords are changed.

This method requires minimal technical expertise, as it uses legitimate Microsoft APIs to produce device codes, which are then distributed through social engineering tactics. The seamless integration with Microsoft’s systems means the process lacks any obvious red flags, making it challenging for even savvy users to recognize the threat.

Preventative Measures and Future Outlook

As the adoption of device code phishing grows among various threat groups, including those using the Kali 365 toolkit and TA4903, organizations are advised to strengthen their defenses. Proofpoint recommends implementing conditional access policies to block device code flow and enforce the use of managed devices for authentication. Additionally, enhancing user education to address this specific phishing method is crucial, as traditional training does not cover this vulnerability.

The rise of proof-of-concept tools like ClickFix has lowered the entry barrier for less experienced criminals, accelerating the spread of device code phishing. This trend is expected to continue, affecting a broad range of targets from individual users to large enterprises. Organizations must remain vigilant and proactive in updating their cybersecurity strategies to mitigate this growing threat.

Stay informed with Cyber Security News for the latest updates on evolving cyber threats. Follow us on Google News, LinkedIn, and X to ensure you remain ahead in the fight against cybercrime.

Cyber Security News Tags:credential theft, cyber threat, Cybersecurity, device code phishing, identity takeover, Microsoft 365, OAuth, phishing attacks, Proofpoint, security tools

Post navigation

Previous Post: Shai-Hulud Malware Threatens Developer Ecosystems
Next Post: Zero-Day Exploits Hit Microsoft Edge, Windows 11, and LiteLLM

Related Posts

Critical Exim GnuTLS Flaw Exposes Servers to Attacks Critical Exim GnuTLS Flaw Exposes Servers to Attacks Cyber Security News
LofyStealer Targets Minecraft Players with Advanced Tactics LofyStealer Targets Minecraft Players with Advanced Tactics Cyber Security News
Sendmarc appoints Rob Bowker as North American Region Lead Sendmarc appoints Rob Bowker as North American Region Lead Cyber Security News
Apache Log4j Vulnerability Allow Attackers to Intercept Sensitive Log Data Apache Log4j Vulnerability Allow Attackers to Intercept Sensitive Log Data Cyber Security News
New Phishing Attack Leverages Popular Brands to Harvest Login Credentials New Phishing Attack Leverages Popular Brands to Harvest Login Credentials Cyber Security News
Critical ProFTPD Vulnerability Allows Remote Code Execution Critical ProFTPD Vulnerability Allows Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zero-Day Exploits Hit Microsoft Edge, Windows 11, and LiteLLM
  • Hackers Exploit OAuth to Steal Microsoft 365 Credentials
  • Shai-Hulud Malware Threatens Developer Ecosystems
  • Turla Develops Kazuar into Advanced P2P Botnet
  • Critical Flaws in OpenClaw AI Threaten 245,000 Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zero-Day Exploits Hit Microsoft Edge, Windows 11, and LiteLLM
  • Hackers Exploit OAuth to Steal Microsoft 365 Credentials
  • Shai-Hulud Malware Threatens Developer Ecosystems
  • Turla Develops Kazuar into Advanced P2P Botnet
  • Critical Flaws in OpenClaw AI Threaten 245,000 Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark