{"id":18987,"date":"2026-03-10T11:04:10","date_gmt":"2026-03-10T11:04:10","guid":{"rendered":"\/cybersecurity-blog\/?p=18987"},"modified":"2026-03-12T14:03:59","modified_gmt":"2026-03-12T14:03:59","slug":"oauth-device-code-phishing","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/","title":{"rendered":"OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector"},"content":{"rendered":"\n<p>ANY.RUN\u2019s analysts are&nbsp;observing&nbsp;a sharp increase in phishing activity abusing Microsoft\u2019s OAuth Device Code flow, with more than 180 phishing URLs detected in just one week.<\/p>\n\n\n\n<p>This technique\u00a0represents\u00a0a shift from credential <a href=\"https:\/\/any.run\/phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a> to token-based account takeover, making detection significantly harder for many SOC teams.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Takeaways&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>OAuth Device Code phishing is rising rapidly.&nbsp;<\/strong>Campaigns abusing Microsoft\u2019s Device Authorization Grant are increasing, with hundreds of phishing URLs appearing in short&nbsp;timeframes.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Account takeover can occur without credential theft.&nbsp;<\/strong>Victims authenticate on legitimate Microsoft pages, yet attackers still receive OAuth tokens that grant account access.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The attack abuses legitimate authentication flows.&nbsp;<\/strong>Threat actors&nbsp;initiate&nbsp;the device authorization process themselves and trick victims into approving it.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Token abuse replaces password theft.&nbsp;<\/strong>Access tokens and refresh tokens&nbsp;allow&nbsp;attackers to&nbsp;operate&nbsp;within Microsoft 365 without needing stolen credentials.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Encrypted HTTPS traffic hides attack signals.&nbsp;<\/strong>Because activity happens on legitimate domains and encrypted channels, detection using traditional indicators becomes harder.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automatic SSL decryption improves detection speed.&nbsp;<\/strong>ANY.RUN Sandbox extracts SSL keys from process memory to decrypt HTTPS traffic, revealing hidden scripts and network activity that enable faster investigations and reduced MTTD and MTTR.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How the Attack Works&nbsp;<\/h2>\n\n\n\n<p>In this campaign, attackers abuse Microsoft\u2019s&nbsp;<strong>device login process<\/strong>, which is normally used to sign in on devices that cannot display a full login page.&nbsp;<\/p>\n\n\n\n<p>The attacker first&nbsp;initiates&nbsp;a login request with Microsoft. This generates two values:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>user_code<\/strong>&nbsp;\u2014 a short, human-readable code (e.g., EL4BGRHUZ) displayed on the fake page as a \u201cverification code;\u201d&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>device_code<\/strong>&nbsp;\u2014 an internal session identifier held only by the attacker, never shown to the victim. This is the &#8216;claim ticket&#8217; the attacker uses to poll Microsoft&#8217;s token endpoint.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The victim is then shown the&nbsp;<strong>user_code<\/strong>&nbsp;on a phishing page, often disguised as a document verification step (for example, a fake&nbsp;DocuSign&nbsp;notification). The page instructs the user to copy the code and enter it at&nbsp;<strong>microsoft[.]com\/devicelogin<\/strong>.&nbsp;<\/p>\n\n\n\n<p>From the user\u2019s perspective, everything appears legitimate. They are redirected to a real Microsoft page, where they enter their credentials and complete MFA.&nbsp;<\/p>\n\n\n\n<p>However, by entering the verification code, the user is unknowingly approving a login request that was&nbsp;initiated&nbsp;by the attacker. While the victim sees only the&nbsp;<strong>user_code<\/strong>, the attacker uses the associated&nbsp;<strong>device_code<\/strong>&nbsp;to collect authentication tokens from Microsoft once the approval is completed.&nbsp;<\/p>\n\n\n\n<p>Microsoft then issues&nbsp;<strong>access tokens<\/strong>&nbsp;to the&nbsp;attacker\u2019s&nbsp;session, allowing them to access the victim\u2019s Microsoft 365 account. Because the login happens through legitimate Microsoft infrastructure, no credentials are stolen on the phishing&nbsp;page&nbsp;and no fake login form is&nbsp;required.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why This Attack Poses a Critical Risk and Is Harder for SOC Teams to Detect&nbsp;<\/h2>\n\n\n\n<p>OAuth Device Code phishing changes how account compromise happens.&nbsp;This campaign&nbsp;represents&nbsp;a structural shift:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The victim interacts with legitimate Microsoft&nbsp;domains;&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Credentials and MFA are entered on authentic&nbsp;pages;&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The attack runs entirely over encrypted&nbsp;HTTPS;&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Traditional phishing indicators may not trigger.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>As a result, token abuse replaces password theft. Detection relies heavily on visibility into encrypted network traffic and behavioral artifacts rather than domain reputation alone.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For SOC teams, this means:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Delayed detection<\/strong>: Account compromise may only be noticed after suspicious activity appears.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Longer investigations<\/strong>: Analysts must reconstruct token-based access rather than analyze credential theft.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Higher incident impact<\/strong>: Attackers can&nbsp;operate&nbsp;inside Microsoft 365&nbsp;immediately&nbsp;after token issuance.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>For organizations, this creates a critical&nbsp;risk<\/strong>: attackers can&nbsp;immediately&nbsp;access corporate email, internal documents, and shared resources, impersonate employees in business email compromise schemes, and potentially&nbsp;maintain&nbsp;persistent access through refresh tokens, turning a single phishing interaction into&nbsp;<strong>data exposure, financial fraud, or broader account compromise<\/strong>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">OAuth Device Code Phishing&nbsp;Example: Full Attack Analysis&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/885afc1c-b616-46d7-9bc3-81185ee07fe3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=oauth-device-code-phishing&amp;utm_term=100326&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View sample analysis in ANY.RUN Interactive Sandbox<\/a>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"562\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-1024x562.png\" alt=\"\" class=\"wp-image-19009\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-1024x562.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-300x165.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-768x421.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-1536x843.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-370x203.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-270x148.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1-740x406.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image-1.png 1841w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Attack chain exposed in the Sandbox<\/em><\/figcaption><\/figure>\n\n\n\n<p>The attack often begins with a landing page impersonating&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/new-malware-tactics\/\" target=\"_blank\" rel=\"noreferrer noopener\">DocuSign<\/a>, prompting the user to \u201cReview Document.\u201d The victim is shown a verification code and instructed to copy it.&nbsp;<\/p>\n\n\n\n<p>Key red flag: this is not a real&nbsp;DocuSign&nbsp;signing workflow. It is a scripted sequence:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Copy the verification code,&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Click \u201cContinue to Microsoft\u201d,&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Paste the code into Microsoft\u2019s device login page.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The address bar typically shows a *.workers.dev&nbsp;domain instead of a legitimate&nbsp;DocuSign&nbsp;domain.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"711\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1-1024x711.png\" alt=\"\" class=\"wp-image-19011\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1-1024x711.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1-300x208.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1-768x533.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1-370x257.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1-270x187.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1-740x514.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image2-1.png 1282w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Fake&nbsp;DocuSign&nbsp;page with a verification code<\/em><\/figcaption><\/figure>\n\n\n\n<p>A Microsoft window then opens at login.microsoftonline.com\/&#8230;\/deviceauth, showing the form&nbsp;\u201cEnter code to allow access.\u201d&nbsp;The user enters the same code they were shown on the fake page.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nReduce MTTD and MTTR for phishing attacks.<br>Employ\u00a0ANY.RUN\u2019s\u00a0solutions\u00a0for\u00a0<span class=\"highlight\">faster investigations and higher detection\u00a0rate.\u00a0<\/span>  \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=oauth-device-code-phishing&#038;utm_term=100326&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nIntegrate in your SOC \n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>This action takes place on a legitimate Microsoft domain, even displaying Microsoft&#8217;s own warning:&nbsp;\u201cDo not enter codes from sources you don&#8217;t trust.\u201d&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"657\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_3-1024x657.png\" alt=\"\" class=\"wp-image-18998\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_3-1024x657.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_3-300x192.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_3-768x493.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_3-370x237.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_3-270x173.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_3-740x475.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_3.png 1384w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Fake verification granting access to external client<\/em>&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>The following screen states: \u201cYou\u2019re signing in to Microsoft Office on another device\u2026\u201d&nbsp;From the victim\u2019s perspective, the process still appears legitimate.&nbsp;In reality, they&nbsp;are approving access for an external client controlled by the attacker, not verifying the document they originally clicked.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"663\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_4-1024x663.png\" alt=\"\" class=\"wp-image-19007\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_4-1024x663.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_4-300x194.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_4-768x497.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_4-370x240.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_4-270x175.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_4-740x479.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/oauth_4.png 1374w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Fake authorization for passing the code<\/em><\/figcaption><\/figure>\n\n\n\n<p>The key point&nbsp;is:&nbsp;the user never enters their password on a fake site. Instead, they are&nbsp;guided through legitimate Microsoft infrastructure and manually transfer a code.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Automatic SSL Decryption Ensures Instant Detection&nbsp;&nbsp;<\/h2>\n\n\n\n<p>From an investigation standpoint, these phishing pages often rely on&nbsp;<strong>JavaScript loaders and encrypted HTTPS traffic<\/strong>&nbsp;to hide the real workflow from traditional scanners.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This is where&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>SSL decryption in the ANY.RUN Sandbox<\/strong><\/a>&nbsp;becomes critical. By extracting TLS encryption keys directly from process memory and decrypting HTTPS traffic during execution, the sandbox reveals the hidden scripts, API requests, and attacker infrastructure involved in the phishing flow.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"729\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image9-1024x729.png\" alt=\"\" class=\"wp-image-19014\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image9-1024x729.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image9-300x214.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image9-768x547.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image9-370x264.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image9-270x192.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image9-740x527.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image9.png 1164w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>SSL decryption allows Suricata IDS rules to detect malicious encrypted traffic<\/em><\/figcaption><\/figure>\n\n\n\n<p>In this case, SSL decryption exposed the&nbsp;<strong>malicious JavaScript responsible for orchestrating the&nbsp;device&nbsp;authorization process<\/strong>&nbsp;and revealed high-confidence network indicators used by the phishing kit. Among them were specific API requests such as&nbsp;<strong>\/api\/device\/start<\/strong>&nbsp;and&nbsp;<strong>\/api\/device\/status\/<\/strong>, along with a distinctive&nbsp;<strong>X-Antibot-Token<\/strong>&nbsp;header used in communication with the backend.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"294\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image7-1024x294.png\" alt=\"\" class=\"wp-image-19015\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image7-1024x294.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image7-300x86.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image7-768x221.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image7-1536x442.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image7-370x106.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image7-270x78.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image7-740x213.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image7.png 1948w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"52\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image8-1024x52.png\" alt=\"\" class=\"wp-image-19016\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image8-1024x52.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image8-300x15.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image8-768x39.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image8-1536x77.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image8-2048x103.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image8-370x19.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image8-270x14.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image8-740x37.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Traffic decrypted with SSL&nbsp;decryption<\/em>&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>When these artifacts appear in HTTP requests to non-legitimate hosts, they become&nbsp;<strong>high-signal network IOCs<\/strong>&nbsp;that analysts can use to detect related phishing infrastructure and pivot to other campaign assets during investigation.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protecting Business from Device Code Phishing Attacks&nbsp;<\/h2>\n\n\n\n<p>Because OAuth Device Code phishing abuses legitimate authentication flows and trusted infrastructure, traditional phishing detection often fails. Preventing account takeover requires&nbsp;strengthening the SOC processes responsible for early detection, fast triage, and proactive hunting.&nbsp;<\/p>\n\n\n\n<p>Security leaders can reduce exposure by improving three key SOC processes.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Expand Threat Coverage with Real-Time Intelligence&nbsp;<\/h3>\n\n\n\n<p>Early visibility is critical for detecting phishing infrastructure before users interact with it. Without fresh threat signals, SOC teams often discover campaigns only after accounts are already compromised.&nbsp;<\/p>\n\n\n\n<p><strong>ANY.RUN\u2019s&nbsp;<\/strong><a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=oauth-device-code-phishing&amp;utm_term=100326&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence Feeds<\/strong><\/a>&nbsp;help organizations improve monitoring by delivering continuously updated indicators derived from live sandbox investigations performed by thousands of security teams worldwide.&nbsp;<\/p>\n\n\n\n<p>For SOC operations, this means:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Earlier detection of emerging phishing infrastructure&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Faster identification of campaigns targeting similar industries&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Higher-quality detection signals entering SIEM, EDR, and network monitoring tools&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>For the business, earlier signals&nbsp;<strong>reduce the likelihood of successful account takeover and lower the probability of incidents escalating into financial fraud or data exposure<\/strong>.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Accelerate Triage&nbsp;to Drive Down MTTD&nbsp;<\/h3>\n\n\n\n<p>When a suspicious link or domain appears in an alert, SOC teams must quickly&nbsp;determine&nbsp;whether it is part of a real attack campaign. Slow validation creates backlogs, analyst fatigue, and delayed response.&nbsp;<\/p>\n\n\n\n<p><strong>ANY.RUN\u2019s&nbsp;<\/strong><a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=oauth-device-code-phishing&amp;utm_term=100326&amp;utm_content=linktosandboxanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Interactive Sandbox<\/strong><\/a>&nbsp;helps analysts investigate suspicious URLs and files in a controlled environment where the full phishing workflow becomes visible.&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"481\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imagea-1024x481.png\" alt=\"\" class=\"wp-image-19018\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imagea-1024x481.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imagea-300x141.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imagea-768x361.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imagea-370x174.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imagea-270x127.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imagea-740x348.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imagea.png 1419w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN\u2019s Sandbox provides instant detection and a response-ready report<\/em>&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>With&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/automatic-ssl-decryption\/\" target=\"_blank\" rel=\"noreferrer noopener\">automatic SSL decryption<\/a>, the sandbox extracts encryption keys directly from process memory and reveals the contents of HTTPS sessions without altering the traffic.&nbsp;<\/p>\n\n\n\n<p>For organizations, this translates into&nbsp;<strong>faster investigation cycles, quicker escalation decisions, and reduced dwell time<\/strong>, limiting the impact of compromised accounts.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nIntegrate ANY.RUN\u2019s solutions for faster\u00a0response.\u00a0<br>Reduce investigation time and\u00a0<span class=\"highlight\">improve detection coverage.\u00a0<\/span>  \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=oauth-device-code-phishing&#038;utm_term=100326&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nContact ANY.RUN\u00a0 \n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Improve Threat Hunting and Campaign Correlation&nbsp;<\/h3>\n\n\n\n<p>Even after a phishing page is discovered,&nbsp;identifying&nbsp;related infrastructure across the campaign is essential for preventing further compromise.&nbsp;<\/p>\n\n\n\n<p><strong>ANY.RUN\u2019s&nbsp;<\/strong><a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=oauth-device-code-phishing&amp;utm_term=100326&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence Lookup<\/strong><\/a>&nbsp;allows analysts to quickly verify whether indicators are linked to known campaigns and explore related artifacts across&nbsp;previous&nbsp;investigations.&nbsp;<\/p>\n\n\n\n<p>This supports SOC teams by enabling them to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>connect alerts to active phishing campaigns&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>identify&nbsp;related domains, files, and infrastructure&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>prioritize investigations based on real attack activity&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>For security leaders, this improves operational efficiency and ensures that analyst time is focused on the threats most likely to&nbsp;impact&nbsp;the business.&nbsp;<\/p>\n\n\n\n<p>For example, indicators associated with this campaign can be queried directly in TI Lookup using the threat name:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=oauth-device-code-phishing&amp;utm_term=100326&amp;utm_content=linktoservice#%7B%2522query%2522:%2522threatName:%255C%2522oauth-ms-phish%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">threatName:&#8221;oauth-ms-phish&#8221;<\/a>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"700\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imageb-1024x700.png\" alt=\"\" class=\"wp-image-19026\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imageb-1024x700.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imageb-300x205.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imageb-768x525.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imageb-370x253.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imageb-270x185.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imageb-740x506.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/imageb.png 1159w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Is your business at risk? Most targeted sectors and countries<\/em>&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>TI Lookup instantly shows the attack landscape.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Recently, the&nbsp;industries&nbsp;most at risk include Technology, Education, Manufacturing, and Government &amp; Administration; primarily in the United States and India, though other countries are also affected.&nbsp;<\/p>\n\n\n\n<p>There are also complete sandbox analyses of these attacks with detailed IOCs and TTPs that the SOC analysts can use to build strong detection rules and prevent similar attacks in the future.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"584\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image5-2-1024x584.png\" alt=\"\" class=\"wp-image-19027\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image5-2-1024x584.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image5-2-300x171.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image5-2-768x438.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image5-2-370x211.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image5-2-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image5-2-740x422.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/03\/image5-2.png 1306w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>View OAuth phishing examples in live sandbox detonations<\/em>&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>This approach helps CISOs move beyond reactive security and&nbsp;establish&nbsp;a proactive defense strategy that aligns with business priorities: minimizing operational disruption, reducing incident response costs, and protecting sensitive corporate identities.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>OAuth Device Code Phishing&nbsp;represents&nbsp;an evolution in account takeover tactics. It bypasses traditional credential harvesting and exploits trust in legitimate authentication flows. The compromise happens through approved token issuance rather than stolen passwords.&nbsp;<\/p>\n\n\n\n<p>Defending against it requires deep visibility into encrypted sessions, behavioral pivoting, and rapid&nbsp;confirmation&nbsp;workflows.&nbsp;<\/p>\n\n\n\n<p>With automatic SSL decryption in ANY.RUN Sandbox, SOC teams gain the ability to see inside encrypted phishing infrastructure without disrupting traffic. What was previously hidden becomes&nbsp;actionable&nbsp;intelligence.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=oauth-device-code-phishing&amp;utm_term=100326&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>&nbsp;supports&nbsp;over 15,000 organizations across industries such as banking, manufacturing, telecommunications, healthcare, retail, and technology, helping them build stronger and more resilient cybersecurity operations.&nbsp;&nbsp;&nbsp;&nbsp;<br>&nbsp;&nbsp;<br>With our cloud-based&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=oauth-device-code-phishing&amp;utm_term=100326&amp;utm_content=linksandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>, security teams can safely analyze and understand threats targeting Windows, Linux, and Android environments in less than 40 seconds and without the need for complex&nbsp;on-premise&nbsp;systems. Combined with&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=oauth-device-code-phishing&amp;utm_term=100326&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, YARA Search, and&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=oauth-device-code-phishing&amp;utm_term=100326&amp;utm_content=landing-feeds\" target=\"_blank\" rel=\"noreferrer noopener\">TI Feeds<\/a>, we equip businesses to speed up investigations, reduce security risks, and improve teams\u2019 efficiency.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IOCs:&nbsp;&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>singer-bodners-bau-at-s-account[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>dibafef289[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ab-monvoisinproduction-com-s-account[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>subzero908[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>sandra-solorzano-duncanfamilyfarms-net-s-account[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>tyler2miler-proton-me-s-account[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>aarathe-ramraj-tipgroup-com-au-s-account[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>andy-bardigans-com-s-account[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>dennis-saltertrusss-com-s-account[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>rockymountainhi[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>workspace1717-outlook-com-s-account[.]workers[.]dev&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>aiinnovationsfly[.]com&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>astrolinktech[.]com&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">FAQ<\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1773140168106\"><strong class=\"schema-faq-question\">What is OAuth Device Code phishing?<\/strong> <p class=\"schema-faq-answer\">It is a phishing technique that abuses the OAuth Device Authorization Grant. Instead of stealing credentials, attackers trick victims into approving a login request initiated by the attacker, which results in OAuth tokens being issued to them.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1773140210566\"><strong class=\"schema-faq-question\">Why don\u2019t victims notice the attack?<\/strong> <p class=\"schema-faq-answer\">Victims authenticate on legitimate Microsoft pages and complete MFA normally. Since no fake login form is used, the process appears trustworthy.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1773140219081\"><strong class=\"schema-faq-question\">What are the main signs of this phishing technique?<\/strong> <p class=\"schema-faq-answer\">Typical indicators include verification codes shown on phishing pages, instructions to visit <code>microsoft[.]com\/devicelogin<\/code>, and suspicious device authorization prompts such as \u201cYou\u2019re signing in on another device.\u201d<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1773140248601\"><strong class=\"schema-faq-question\">Which industries are most at risk?<\/strong> <p class=\"schema-faq-answer\">Campaign analysis shows targeting of technology companies, educational institutions, financial organizations, and government agencies, although any Microsoft 365 user can be affected.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1773140259337\"><strong class=\"schema-faq-question\">Why is this attack difficult for SOC teams to detect?<\/strong> <p class=\"schema-faq-answer\">The attack leverages legitimate authentication infrastructure and encrypted HTTPS traffic. Without deep inspection of network activity, the malicious flow blends into normal login behavior.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1773140274680\"><strong class=\"schema-faq-question\">How does SSL decryption help detect these attacks?<\/strong> <p class=\"schema-faq-answer\">SSL decryption exposes hidden JavaScript and encrypted traffic within phishing pages, allowing analysts to observe real network requests, identify IoCs, and reconstruct the attack chain.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1773140283627\"><strong class=\"schema-faq-question\">How can organizations reduce the risk?<\/strong> <p class=\"schema-faq-answer\">Organizations should combine threat intelligence, strong identity controls, security awareness, and dynamic malware analysis tools such as ANY.RUN Sandbox to quickly detect phishing infrastructure and extract behavioral indicators.<\/p> <\/div> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>ANY.RUN\u2019s analysts are&nbsp;observing&nbsp;a sharp increase in phishing activity abusing Microsoft\u2019s OAuth Device Code flow, with more than 180 phishing URLs detected in just one week. This technique\u00a0represents\u00a0a shift from credential phishing to token-based account takeover, making detection significantly harder for many SOC teams.\u00a0 Key Takeaways&nbsp; How the Attack Works&nbsp; In this campaign, attackers abuse Microsoft\u2019s&nbsp;device [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":19033,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,32,34,40,63],"class_list":["post-18987","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-detection","tag-malware-analysis","tag-malware-behavior","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft OAuth Device Code Phishing<\/title>\n<meta name=\"description\" content=\"OAuth Device Code phishing explained: how attackers steal M365 access tokens and how SSL decryption in ANY.RUN Sandbox helps detect it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GridGuardGhoul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/\"},\"author\":{\"name\":\"GridGuardGhoul\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector\",\"datePublished\":\"2026-03-10T11:04:10+00:00\",\"dateModified\":\"2026-03-12T14:03:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/\"},\"wordCount\":2282,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"detection\",\"malware analysis\",\"malware behavior\",\"phishing\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#respond\"]}]},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/\",\"name\":\"Microsoft OAuth Device Code Phishing\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2026-03-10T11:04:10+00:00\",\"dateModified\":\"2026-03-12T14:03:59+00:00\",\"description\":\"OAuth Device Code phishing explained: how attackers steal M365 access tokens and how SSL decryption in ANY.RUN Sandbox helps detect it.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140168106\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140210566\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140219081\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140248601\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140259337\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140274680\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140283627\"}],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"GridGuardGhoul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/01\/image_GridGuardGhoul.jpeg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/01\/image_GridGuardGhoul.jpeg\",\"caption\":\"GridGuardGhoul\"},\"description\":\"I am a network security researcher and reverse engineer exploring malware, protocols, and exploits.\",\"url\":\"#molongui-disabled-link\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140168106\",\"position\":1,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140168106\",\"name\":\"What is OAuth Device Code phishing?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"It is a phishing technique that abuses the OAuth Device Authorization Grant. Instead of stealing credentials, attackers trick victims into approving a login request initiated by the attacker, which results in OAuth tokens being issued to them.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140210566\",\"position\":2,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140210566\",\"name\":\"Why don\u2019t victims notice the attack?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Victims authenticate on legitimate Microsoft pages and complete MFA normally. Since no fake login form is used, the process appears trustworthy.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140219081\",\"position\":3,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140219081\",\"name\":\"What are the main signs of this phishing technique?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Typical indicators include verification codes shown on phishing pages, instructions to visit microsoft[.]com\/devicelogin, and suspicious device authorization prompts such as \u201cYou\u2019re signing in on another device.\u201d\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140248601\",\"position\":4,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140248601\",\"name\":\"Which industries are most at risk?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Campaign analysis shows targeting of technology companies, educational institutions, financial organizations, and government agencies, although any Microsoft 365 user can be affected.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140259337\",\"position\":5,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140259337\",\"name\":\"Why is this attack difficult for SOC teams to detect?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The attack leverages legitimate authentication infrastructure and encrypted HTTPS traffic. Without deep inspection of network activity, the malicious flow blends into normal login behavior.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140274680\",\"position\":6,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140274680\",\"name\":\"How does SSL decryption help detect these attacks?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"SSL decryption exposes hidden JavaScript and encrypted traffic within phishing pages, allowing analysts to observe real network requests, identify IoCs, and reconstruct the attack chain.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140283627\",\"position\":7,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140283627\",\"name\":\"How can organizations reduce the risk?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Organizations should combine threat intelligence, strong identity controls, security awareness, and dynamic malware analysis tools such as ANY.RUN Sandbox to quickly detect phishing infrastructure and extract behavioral indicators.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft OAuth Device Code Phishing","description":"OAuth Device Code phishing explained: how attackers steal M365 access tokens and how SSL decryption in ANY.RUN Sandbox helps detect it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/","twitter_misc":{"Written by":"GridGuardGhoul","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/"},"author":{"name":"GridGuardGhoul","@id":"https:\/\/any.run\/"},"headline":"OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector","datePublished":"2026-03-10T11:04:10+00:00","dateModified":"2026-03-12T14:03:59+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/"},"wordCount":2282,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","detection","malware analysis","malware behavior","phishing"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#respond"]}]},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/","url":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/","name":"Microsoft OAuth Device Code Phishing","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2026-03-10T11:04:10+00:00","dateModified":"2026-03-12T14:03:59+00:00","description":"OAuth Device Code phishing explained: how attackers steal M365 access tokens and how SSL decryption in ANY.RUN Sandbox helps detect it.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140168106"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140210566"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140219081"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140248601"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140259337"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140274680"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140283627"}],"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"GridGuardGhoul","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/01\/image_GridGuardGhoul.jpeg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/01\/image_GridGuardGhoul.jpeg","caption":"GridGuardGhoul"},"description":"I am a network security researcher and reverse engineer exploring malware, protocols, and exploits.","url":"#molongui-disabled-link"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140168106","position":1,"url":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140168106","name":"What is OAuth Device Code phishing?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It is a phishing technique that abuses the OAuth Device Authorization Grant. Instead of stealing credentials, attackers trick victims into approving a login request initiated by the attacker, which results in OAuth tokens being issued to them.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140210566","position":2,"url":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140210566","name":"Why don\u2019t victims notice the attack?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Victims authenticate on legitimate Microsoft pages and complete MFA normally. Since no fake login form is used, the process appears trustworthy.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140219081","position":3,"url":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140219081","name":"What are the main signs of this phishing technique?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Typical indicators include verification codes shown on phishing pages, instructions to visit microsoft[.]com\/devicelogin, and suspicious device authorization prompts such as \u201cYou\u2019re signing in on another device.\u201d","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140248601","position":4,"url":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140248601","name":"Which industries are most at risk?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Campaign analysis shows targeting of technology companies, educational institutions, financial organizations, and government agencies, although any Microsoft 365 user can be affected.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140259337","position":5,"url":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140259337","name":"Why is this attack difficult for SOC teams to detect?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The attack leverages legitimate authentication infrastructure and encrypted HTTPS traffic. Without deep inspection of network activity, the malicious flow blends into normal login behavior.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140274680","position":6,"url":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140274680","name":"How does SSL decryption help detect these attacks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"SSL decryption exposes hidden JavaScript and encrypted traffic within phishing pages, allowing analysts to observe real network requests, identify IoCs, and reconstruct the attack chain.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140283627","position":7,"url":"https:\/\/any.run\/cybersecurity-blog\/oauth-device-code-phishing\/#faq-question-1773140283627","name":"How can organizations reduce the risk?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Organizations should combine threat intelligence, strong identity controls, security awareness, and dynamic malware analysis tools such as ANY.RUN Sandbox to quickly detect phishing infrastructure and extract behavioral indicators.","inLanguage":"en-US"},"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/18987"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=18987"}],"version-history":[{"count":20,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/18987\/revisions"}],"predecessor-version":[{"id":19036,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/18987\/revisions\/19036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/19033"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=18987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=18987"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=18987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}