By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Theft of Microsoft 365 accounts increases
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > Theft of Microsoft 365 accounts increases
Mobile

Theft of Microsoft 365 accounts increases

News Room
Last updated: 2025/12/29 at 7:37 PM
News Room Published 29 December 2025
Share
Theft of Microsoft 365 accounts increases
SHARE

The cybersecurity company Proofpoint has detected a strong increase in Microsoft 365 account takeoversdriven by attackers abusing OAuth authorizations, a legitimate Microsoft login process.

These campaigns begin with an initial message that includes a URL embedded in a button, hyperlinked text, or within a QR code. When the user accesses the URL, an attack sequence is initiated that leverages Microsoft’s legitimate device authorization process. The user receives a device code, which can be displayed directly on the landing page or received in a second email sent by the attacker. The honeypots indicate that the code is a one-time password (OTP) and direct the user to enter it at the Microsoft verification URL. When this is done, the original token is validated, granting the attacker access to the target M365 account.

Phishing using device codes opens the door to potential data theft, lateral movement within the network, and persistent compromises. Proofpoint had previously detected targeted malicious activity and limited red teaming actions, that is, controlled practices to test security of this type. Although it is not a completely new technique, it has been striking for experts to see its use by multiple groups such as TA2723, the Russian pro-state group UNK_AcademicFlare and others.

According to Proofpoint researchers, there are tools that facilitate the spread of these attacks, such as the SquarePhish2 and Graphish kits, as well as malicious applications for sale on hacking forums that automate and expand phishing with device codes, reducing technical barriers for attackers.

The most effective mitigation measure is to completely block the flow of device codes. Where this is not feasible, a whitelist-based approach may be adopted, limited to specific and justified use cases, requiring logins to be made from compliant or pre-registered devices. All of this must be complemented by strengthening user awareness and training against this type of non-traditional phishing attacks.

«This trend marks an important evolution in phishing, which shifts attacks from password theft to abuse of trusted authentication flowswhile making users believe that they are protecting their accounts”analyze the Proofpoint researchers. «We recommend that organizations reinforce controls over OAuth, as well as user awareness and training against these emerging risks. This aspect is especially relevant in a context in which phishing-resistant multi-factor authentication mechanisms, such as those based on the FIDO standard, are increasingly being adopted, since the abuse of OAuth authentication flows is expected to continue to increase as these technologies become more widespread..

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Despite Lawsuit Over iOS 26 Leaks, YouTuber Posts Foldable iPhone Renders Despite Lawsuit Over iOS 26 Leaks, YouTuber Posts Foldable iPhone Renders
Next Article ‘Why should we pay these criminals?’: the hidden world of ransomware negotiations ‘Why should we pay these criminals?’: the hidden world of ransomware negotiations
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

How to Build a Community on Social Media |
How to Build a Community on Social Media |
Computing
Deal: The ARK Uno wireless charger is made of wood, and it is at an all-time low price!
Deal: The ARK Uno wireless charger is made of wood, and it is at an all-time low price!
News
Pi Hackathon 2025 Signals a Maturing Open Network Ecosystem | HackerNoon
Pi Hackathon 2025 Signals a Maturing Open Network Ecosystem | HackerNoon
Computing
Today's NYT Strands Hints, Answer and Help for Dec. 30 #667 – CNET
Today's NYT Strands Hints, Answer and Help for Dec. 30 #667 – CNET
News

You Might also Like

Civilian ships that can be converted into missile launchers
Mobile

Civilian ships that can be converted into missile launchers

4 Min Read
This Popular Puzzle Game Is Free On Epic Games Store For A Limited Time: How To Claim
Mobile

This Popular Puzzle Game Is Free On Epic Games Store For A Limited Time: How To Claim

4 Min Read
the three most worrying warning signs are now confirmed
Mobile

the three most worrying warning signs are now confirmed

8 Min Read
Atos will sell its divisions in Latin America to the Brazilian Semantix
Mobile

Atos will sell its divisions in Latin America to the Brazilian Semantix

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?