By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers
Computing

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

News Room
Last updated: 2025/12/19 at 3:13 PM
News Room Published 19 December 2025
Share
Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers
SHARE

Dec 19, 2025Ravie LakshmananCybersecurity / Cloud Security

A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to steal victims’ Microsoft 365 credentials and conduct account takeover attacks.

The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare.

The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe.

“Typically, these compromised email addresses are used to conduct benign outreach and rapport building related to the targets’ area of expertise to ultimately arrange a fictitious meeting or interview,” the enterprise security company said.

Cybersecurity

As part of these efforts, the adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender’s Microsoft OneDrive account and instructs the victim to copy the provided code and click “Next” to access the supposed document.

However, doing so redirects the user to the legitimate Microsoft device code login URL, where, once the previously provided code is entered, it causes the service to generate an access token that can then be recovered by the three actors to take control of the victim account.

Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. Over the past couple of months, Amazon Threat Intelligence and Volexity have warned of continued attacks mounted by Russian threat actors by abusing the device code authentication flow.

Proofpoint said UNK_AcademicFlare is likely a Russia-aligned threat actor given its targeting of Russia-focused specialists at multiple think tanks and Ukrainian government and energy sector organizations.

Data from the company shows that multiple threat actors, both state-aligned and financially-motivated, have latched onto the phishing tactic to deceive users into giving them access to Microsoft 365 accounts. This includes an e-crime group named TA2723 that has used salary-related lures in phishing emails to direct users to fake landing pages and trigger device code authorization.

Cybersecurity

The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish.

“Similar to SquarePhish, the tool is designed to be user-friendly and does not require advanced technical expertise, lowering the barrier for entry and enabling even low-skilled threat actors to conduct sophisticated phishing campaigns,” Proofpoint said. “The ultimate objective is unauthorized access to sensitive personal or organizational data, which can be exploited for credential theft, account takeover, and further compromise.”

To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that’s not feasible, it’s advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Samsung SmartThings is first to support Matter cameras with 1.5 update Samsung SmartThings is first to support Matter cameras with 1.5 update
Next Article Apple’s foldable iPhone reveal likely in 2026 — with delivery delays Apple’s foldable iPhone reveal likely in 2026 — with delivery delays
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The Rise of Text-to-Image Editing: How NLP is Changing Visual Content Creation | HackerNoon
The Rise of Text-to-Image Editing: How NLP is Changing Visual Content Creation | HackerNoon
Computing
Shop the LG 65-inch B5 Series AI OLED 4K TV for 0 off at Amazon
Shop the LG 65-inch B5 Series AI OLED 4K TV for $100 off at Amazon
News
Gemini isn’t replacing Google Assistant on Android just yet
Gemini isn’t replacing Google Assistant on Android just yet
News
Donald Trump as fusion entrepreneur? Washington state energy rivals react to B deal
Donald Trump as fusion entrepreneur? Washington state energy rivals react to $6B deal
Computing

You Might also Like

The Rise of Text-to-Image Editing: How NLP is Changing Visual Content Creation | HackerNoon
Computing

The Rise of Text-to-Image Editing: How NLP is Changing Visual Content Creation | HackerNoon

0 Min Read
Donald Trump as fusion entrepreneur? Washington state energy rivals react to B deal
Computing

Donald Trump as fusion entrepreneur? Washington state energy rivals react to $6B deal

5 Min Read
Wine 11.0-rc3 Released With Another Week Of Bug Fixing
Computing

Wine 11.0-rc3 Released With Another Week Of Bug Fixing

1 Min Read
REDMI launches the K80 Pro with Snapdragon 8 Elite processor
Computing

REDMI launches the K80 Pro with Snapdragon 8 Elite processor

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?