Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Campaign Exploits OAuth Tokens in Microsoft 365

Phishing Campaign Exploits OAuth Tokens in Microsoft 365

Posted on February 20, 2026 By CWS

A sophisticated phishing campaign is targeting Microsoft 365 users in North America, exploiting OAuth tokens to secure prolonged access to corporate systems. This threat specifically targets business users, focusing on services like Outlook, Teams, and OneDrive without the need to steal passwords directly.

Innovative Phishing Techniques

Unlike traditional methods that use fake login forms, this campaign manipulates victims into completing genuine sign-ins on Microsoft’s device login portal. This approach makes detection challenging for both users and standard security measures.

Successfully compromised accounts allow attackers to manage emails and files discreetly, posing significant risks to sensitive information and communications within organizations.

Campaign Discovery and Tactics

Researchers from KnowBe4 Threat Labs uncovered this campaign in late 2025. The attackers cleverly merge realistic phishing emails with the OAuth 2.0 Device Authorization Grant flow. This technique allows them to bypass robust security measures like strong passwords and Multi-Factor Authentication.

Social engineering plays a pivotal role, with phishing emails crafted around themes such as payment confirmations and voicemail notifications, enticing professionals to react swiftly.

Understanding the Attack Mechanics

The attack initiates when a victim enters a device code, supplied by the attacker, on the official Microsoft login page. This action grants the attackers valid OAuth access and refresh tokens linked to the victim’s account, enabling persistent unauthorized access.

This stealthy method avoids detection by standard monitoring systems, as the actions appear legitimate under the victim’s user context, leading to unauthorized data access and potential data breaches.

Mitigation Strategies

Organizations are urged to block known malicious domains and scrutinize email logs for suspicious patterns. It’s crucial to audit recently consented OAuth applications for unusual entries and consider disabling the device code flow or restricting it through Conditional Access policies.

Security teams should also monitor Azure AD sign-in logs for irregular device code activities and geographic inconsistencies. Increasing user awareness about phishing tactics can further help in mitigating these risks.

Stay informed with the latest security updates by following us on Google News, LinkedIn, and X. Set CSN as your preferred source on Google for quick access to cybersecurity news.

Cyber Security News Tags:Authentication, business security, cloud security, cyber threats, Cybersecurity, data protection, device login, email security, IT policies, KnowBe4, Microsoft 365, North America, OAuth tokens, phishing campaign, security awareness

Post navigation

Previous Post: Android Malware Uses AI for Extended Device Control
Next Post: AI-Driven Penetration Testing with 20+ Integrated Tools

Related Posts

Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cyber Security News
CodeSign Secure v3.02: Future of Code Signing with PQC CodeSign Secure v3.02: Future of Code Signing with PQC Cyber Security News
Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization Cyber Security News
What 2025 Taught Us About Modern Malware What 2025 Taught Us About Modern Malware Cyber Security News
Predictive Cyber Risk Analysis Using Aggregated Threat Intelligence Predictive Cyber Risk Analysis Using Aggregated Threat Intelligence Cyber Security News
New FortiWeb 0-Day Code Execution Vulnerability Exploited in the Wild New FortiWeb 0-Day Code Execution Vulnerability Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News