Microsoft 365 account identities are being stolen!

SCWorld.com reported that “A threat actor was observed using device code phishing to trick unsuspecting users into granting a cybercriminal access to their Microsoft 365 accounts.”  The December 22, 2025 article entitled " Threat groups steal identities to access Microsoft 365 accounts” (https://tinyurl.com/269zurae) included these comments:

In a Dec. 18 blog post, Proofpoint Threat Research explained that in device code phishing, an attacker will socially engineer someone into logging into an application with legitimate credentials. The app then generates a token that’s obtained by the threat actor, which gives them control over the Microsoft 365 account.

While it’s not a novel technique, the Proofpoint team pointed out that it’s notable to see it used increasingly by multiple threat clusters, including TA2723, a tracked financially motivated cybercriminal threat actor.

“Over the last few years, there has been an increasing focus by threat actors on identity, including account takeovers, which is the result of a successful attack using the OAuth device code phishing technique we’ve reported,” said Sarah Sabotka, a staff threat researcher at Proofpoint. “If a threat actor can successfully establish a foothold by compromising a legitimate user’s identity, the opportunities for upstream attacks are endless.”

Are you surprised?

Next
Next

NO SURPRISE: AI helping identify theft!