{"id":14626,"date":"2025-07-09T16:15:04","date_gmt":"2025-07-09T04:15:04","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=14626"},"modified":"2025-07-09T16:15:04","modified_gmt":"2025-07-09T04:15:04","slug":"device-phishing","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=14626","title":{"rendered":"Device Code Phishing: A Dangerous New Scam You Need to Know About"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h3 class=\"whitespace-normal break-words\"><strong>Device code phishing<\/strong> is a sneaky new way hackers are stealing people&#8217;s online accounts.<\/h3>\n<p class=\"whitespace-normal break-words\">In device code phishing, threat actors exploit the device code authentication flow to capture authentication tokens, which they then use to access target accounts, and further gain access to data and other services that the compromised account has access to.<\/p>\n<p class=\"whitespace-normal break-words\">Unlike regular phishing emails that take you to fake websites, this scam tricks you into using real login pages with codes that actually belong to the hackers.<\/p>\n<p class=\"whitespace-normal break-words\">Here&#8217;s the scary part: <strong>The device code techniques are particularly dangerous because the phishing emails don&#8217;t carry malicious links or attachments and aren&#8217;t easily identified by cybersecurity products<\/strong>. Even people who are usually careful about clicking suspicious links can fall for this because everything looks completely legitimate.<\/p>\n<p class=\"whitespace-normal break-words\">The attacks have been ongoing since August 2024 and have targeted governments, NGOs, and a wide range of industries in multiple regions. Most recently, Microsoft discovered cyberattacks being launched by a group we call Storm-2372, who we assess with moderate confidence aligns with Russia&#8217;s interests and tradecraft.<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\" level=\"2\">What Exactly Are Device Codes?<\/h2>\n<p class=\"whitespace-normal break-words\">To understand this scam, you first need to know what device codes are. A device code is a numeric or alphanumeric code used to authenticate an account from an input-constrained device that does not have the ability to perform an interactive authentication using a web flow.<\/p>\n<p class=\"whitespace-normal break-words\">Think about when you want to watch Netflix on your smart TV. The TV doesn&#8217;t have a full keyboard, so typing in your email and password would be really annoying. Instead, Netflix shows you a short code on your TV screen and tells you to go to a website on your phone or computer to enter that code. Once you enter the code and log in on your phone, your TV gets connected to your Netflix account. It&#8217;s actually pretty convenient!<\/p>\n<p class=\"whitespace-normal break-words\">To better understand what a &#8220;device code&#8221; is, take into consideration when purchasing a new smart television. That television may come with apps installed such as Netflix or AppleTV.\u00a0 Well, in order to use those applications, you need to sign in to your account.\u00a0 Now, it&#8217;s clearly not practical to be mashing TV remote buttons all day trying to type out our 24-character password, so we use codes as a better way.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\" level=\"2\">How the Scam Works<\/h2>\n<p class=\"whitespace-normal break-words\">Here&#8217;s where the hackers get clever. To prepare for this attack, the threat actor starts to log into a legitimate service you already belong to (e.g., Microsoft, Netflix, third-party app, etc.) using your account&#8217;s user ID and gets a legitimate device code (meant for you) sent to them instead.<\/p>\n<p class=\"whitespace-normal break-words\">The attack usually happens in these steps:<\/p>\n<ol class=\"[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-decimal space-y-1.5 pl-7\" depth=\"0\">\n<li class=\"whitespace-normal break-words\" index=\"0\"><strong>The Setup<\/strong>: Hackers generate a real device code using your account information<\/li>\n<li class=\"whitespace-normal break-words\" index=\"1\"><strong>The Contact<\/strong>: The attackers contact the end-user via third-party messaging platforms such as WhatsApp\/ Signal or even Microsoft Teams. Mostly they share context related to fake meeting invitations\/ calendar invitations with a code (device code)<\/li>\n<li class=\"whitespace-normal break-words\" index=\"2\"><strong>The Trick<\/strong>: They send you a message that looks like it&#8217;s from Microsoft Teams, your IT department, or another trusted source, asking you to enter a code on a legitimate Microsoft login page<\/li>\n<li class=\"whitespace-normal break-words\" index=\"3\"><strong>The Trap<\/strong>: When you enter the code and log in, this tricks the login service into believing that the other device under the control of the hacker is yours<\/li>\n<\/ol>\n<p class=\"whitespace-normal break-words\">The generated Device Codes are only valid for 15 minutes once they are created. As a result, they have to have real-time communication with the victim.\u00a0 They need the victim to expect the &#8220;invitation&#8221;.\u00a0<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&quot;1_2&quot; _builder_version=&quot;4.27.4&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;][et_pb_image src=&quot;https:\/\/new.kinetics.co.nz\/wp-content\/uploads\/2025\/07\/DevicePhishingSM.png&quot; title_text=&quot;DevicePhishingSM&quot; _builder_version=&quot;4.27.4&quot; _module_preset=&quot;default&quot; hover_enabled=&quot;0&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot; border_radii=&quot;on|20px|20px|20px|20px&quot; box_shadow_style=&quot;preset1&quot; sticky_enabled=&quot;0&quot;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&quot;1_2,1_2&quot; _builder_version=&quot;4.27.4&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;][et_pb_column type=&quot;1_2&quot; _builder_version=&quot;4.27.4&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;][et_pb_text _builder_version=&quot;4.27.4&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot; theme_builder_area=&quot;post_content&quot;]<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\" level=\"2\">Real Examples of These Attacks<\/h2>\n<h3 class=\"text-lg font-bold text-text-100 mt-1 -mb-1.5\" level=\"3\">Example 1: Fake Microsoft Teams Meeting<\/h3>\n<p class=\"whitespace-normal break-words\">A <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/02\/13\/storm-2372-conducts-device-code-phishing-campaign\/\">phishing attack that masquerades as Microsoft Teams<\/a> meeting invitation, delivered through email. When the victims click the meeting invitation, they are prompted to authenticate using a threat actor-generated device code. You might get an email that looks like your boss is inviting you to an urgent meeting, but when you click to join, you&#8217;re asked to enter a code to &#8220;verify your identity.&#8221;<\/p>\n<h3 class=\"text-lg font-bold text-text-100 mt-1 -mb-1.5\" level=\"3\">Example 2: Fake Military Official Contact<\/h3>\n<p class=\"whitespace-normal break-words\">Volexity are cyber-specialists.\u00a0 In their <a href=\"https:\/\/www.volexity.com\/blog\/2025\/02\/13\/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication\/\">investigation of an incident<\/a>, they reviewed emails to the user leading up the time of the authentication event. This review identified a suspicious email just moments before the login activity from an email address purporting to be from someone with the name of a high-ranking official from the Ukrainian Ministry of Defence. In this case, hackers pretended to be important government officials to trick their targets.<\/p>\n<h3 class=\"text-lg font-bold text-text-100 mt-1 -mb-1.5\" level=\"3\">Example 3: Signal Messenger Scam<\/h3>\n<p class=\"whitespace-normal break-words\">Through its investigations, <a href=\"https:\/\/www.volexity.com\/blog\/2025\/02\/13\/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication\/\">Volexity<\/a> discovered that Russian threat actors were impersonating a variety of individuals in order to socially engineer targets. In one case, This individual then requested the victim move off Signal to another secure chat application called Element. The attacker then had the victim join an Element server they controlled under the domain sen-comms[.]com.<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\" level=\"2\">Why This Scam Is So Dangerous<\/h2>\n<p class=\"whitespace-normal break-words\">There are several reasons why device code phishing is particularly scary:<\/p>\n<p class=\"whitespace-normal break-words\"><strong>It Uses Real Websites<\/strong>: A user who is up on their Security Awareness Training might know to be rightfully suspicious of links, but may let their guard down when they see <a class=\"underline\" href=\"https:\/\/microsoft.com\/devicelogin\">https:\/\/microsoft.com\/devicelogin<\/a> as the URL. You&#8217;re not being sent to a fake website &#8211; you&#8217;re using the real Microsoft login page!<\/p>\n<p class=\"whitespace-normal break-words\"><strong>It Bypasses Security Training<\/strong>: Most security training teaches people to look for suspicious links or fake websites. But in this scam, everything looks completely legitimate because it IS legitimate &#8211; except for the code you&#8217;re entering.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Long-Term Access<\/strong>: The additional benefit of refresh tokens is that they allow attackers persistent access to victim accounts even after the initial authentication. Once hackers get in, they can stay in your account for a long time.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Hard to Detect<\/strong>: There&#8217;s no true exploitation occurring during this attack outside of tricking someone into using the device code flow when they shouldn&#8217;t. Since everything is using legitimate systems, security software has a hard time catching it.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|10px|20px|10px|false|false&#8221; border_radii=&#8221;on|4px|4px|4px|4px&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#7CDA24&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\" level=\"2\">How to Protect Yourself<\/h2>\n<h3 class=\"text-lg font-bold text-text-100 mt-1 -mb-1.5\" level=\"3\">For Regular Users<\/h3>\n<p class=\"whitespace-normal break-words\"><strong>Be Suspicious of Unexpected Codes<\/strong>: It is uncommon for users to approve a device code sent to them without having attempted to log in to a service on a new device first, where a device code would typically be requested. If someone sends you a code to enter but you didn&#8217;t try to sign in to anything, that&#8217;s a red flag.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Verify Before You Act<\/strong>: If you get a message asking you to enter a device code, especially if it claims to be urgent, pause and verify. Call your IT department or the person who supposedly sent the message using a different method to confirm it&#8217;s real.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Know the Warning Signs<\/strong>:<\/p>\n<ul class=\"[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc space-y-1.5 pl-7\" depth=\"0\">\n<li class=\"whitespace-normal break-words\" index=\"0\">Messages that create urgency (&#8220;You must enter this code immediately!&#8221;)<\/li>\n<li class=\"whitespace-normal break-words\" index=\"1\">Requests to enter codes when you haven&#8217;t tried to log in to anything<\/li>\n<li class=\"whitespace-normal break-words\" index=\"2\">Meeting invitations from people you don&#8217;t recognize<\/li>\n<li class=\"whitespace-normal break-words\" index=\"3\">Messages asking you to use device codes for &#8220;security verification&#8221;<\/li>\n<\/ul>\n<p class=\"whitespace-normal break-words\"><strong>Don&#8217;t Enter Codes Unless You Initiated the Process<\/strong>: Employees should be educated on the following: Recognizing phishing attempts that ask for authentication outside of expected workflows. Only enter device codes when YOU are the one trying to log in to a new device.<\/p>\n<h3 class=\"text-lg font-bold text-text-100 mt-1 -mb-1.5\" level=\"3\">For Organisations and IT Departments<\/h3>\n<p class=\"whitespace-normal break-words\"><strong>Use Conditional Access Policies<\/strong>: The most effective defence against device code phishing attacks is creating conditional access policies that completely prohibit device code authentication for an organisation&#8217;s Microsoft 365 tenant. If your organization doesn&#8217;t need device codes, just turn them off completely.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Monitor Sign-in Logs<\/strong>: Use the below KQL query to search across the environment for the usage of the device code flow. SigninLogs | where TimeGenerated &gt; ago(90d) | where AuthenticationProtocol == &#8220;deviceCode&#8221; IT teams should regularly check who is using device codes and investigate anything suspicious.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Set Up Geographic Restrictions<\/strong>: Conditional access policies should be configured to enforce the following: Device compliance requirements (e.g., requiring Intune-enrolled devices) Geolocation restrictions to block access from unexpected regions. This is now <a href=\"https:\/\/new.kinetics.co.nz\/kinetics-kare-foundation-security-notice\/\">standard in Kinetics KARE<\/a> Foundation unless a client asks us to turn it off.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Require Device Compliance<\/strong>: This security barrier is impossible, at least based on current knowledge, to bypass or fake and will prevent any users from using Device Code Flow and getting phished in the first place.<\/p>\n<p class=\"whitespace-normal break-words\"><strong>Train Your Employees<\/strong>: Organizations should also incorporate device code phishing scenarios into red team exercises and simulated phishing campaigns to measure employee susceptibility and improve overall resilience.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; border_width_top=&#8221;2px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\" level=\"2\">The Bottom Line<\/h2>\n<p class=\"whitespace-normal break-words\">Device code phishing represents a new evolution in cybercrime that&#8217;s much harder to spot than traditional phishing. Volexity&#8217;s visibility into targeted attacks indicates this particular method has been far more effective than the combined effort of years of other social-engineering and spear-phishing attacks conducted by the same (or similar) threat actors.<\/p>\n<p class=\"whitespace-normal break-words\">The key to staying safe is understanding that just because a website looks legitimate doesn&#8217;t mean the request is legitimate. When in doubt, verify through a different channel before entering any codes. And remember: if you didn&#8217;t try to log in to something, you shouldn&#8217;t be entering device codes.<\/p>\n<p class=\"whitespace-normal break-words\">Stay vigilant, and when something feels off, trust your instincts and ask for help!<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(34,34,34,0.1)&#8221; custom_padding=&#8221;20px|10px|20px|10px|false|false&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; border_width_all=&#8221;1px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<h2 class=\"text-xl font-bold text-text-100 mt-1 -mb-0.5\" level=\"2\">References<\/h2>\n<ol class=\"[&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-decimal space-y-1.5 pl-7\" depth=\"0\">\n<li class=\"whitespace-normal break-words\" index=\"0\">Microsoft Security Blog. &#8220;Storm-2372 conducts device code phishing campaign.&#8221; February 14, 2025. <a class=\"underline\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/02\/13\/storm-2372-conducts-device-code-phishing-campaign\/\">https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/02\/13\/storm-2372-conducts-device-code-phishing-campaign\/<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"1\">Huntress. &#8220;Device Code Phishing in Google Cloud and Azure.&#8221; <a class=\"underline\" href=\"https:\/\/www.huntress.com\/blog\/oh-auth-2-0-device-code-phishing-in-google-cloud-and-azure\">https:\/\/www.huntress.com\/blog\/oh-auth-2-0-device-code-phishing-in-google-cloud-and-azure<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"2\">Cybersecurity Dive. &#8220;Phishing campaign targets Microsoft device-code authentication flows.&#8221; February 18, 2025. <a class=\"underline\" href=\"https:\/\/www.cybersecuritydive.com\/news\/phishing-campaign-targets-microsoft-device-code-authentication-flows\/740201\/\">https:\/\/www.cybersecuritydive.com\/news\/phishing-campaign-targets-microsoft-device-code-authentication-flows\/740201\/<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"3\">Volexity. &#8220;Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication.&#8221; February 13, 2025. <a class=\"underline\" href=\"https:\/\/www.volexity.com\/blog\/2025\/02\/13\/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication\/\">https:\/\/www.volexity.com\/blog\/2025\/02\/13\/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication\/<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"4\">Push Security. &#8220;SaaS Attacks &#8211; Device Code Phishing.&#8221; <a class=\"underline\" href=\"https:\/\/github.com\/pushsecurity\/saas-attacks\/blob\/main\/techniques\/device_code_phishing\/description.md\">https:\/\/github.com\/pushsecurity\/saas-attacks\/blob\/main\/techniques\/device_code_phishing\/description.md<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"5\">Black Hills Information Security. &#8220;Dynamic Device Code Phishing.&#8221; May 23, 2023. <a class=\"underline\" href=\"https:\/\/www.blackhillsinfosec.com\/dynamic-device-code-phishing\/\">https:\/\/www.blackhillsinfosec.com\/dynamic-device-code-phishing\/<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"6\">SOCRadar. &#8220;Storm-2372: Russian APT Using Device Code Phishing in Advanced Attacks.&#8221; April 7, 2025. <a class=\"underline\" href=\"https:\/\/socradar.io\/storm-2372-russian-apt-using-device-code-phishing-in-advanced-attacks\/\">https:\/\/socradar.io\/storm-2372-russian-apt-using-device-code-phishing-in-advanced-attacks\/<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"7\">eSentire. &#8220;Device Code Authentication Phishing.&#8221; February 18, 2025. <a class=\"underline\" href=\"https:\/\/www.esentire.com\/security-advisories\/device-code-authentication-phishing\">https:\/\/www.esentire.com\/security-advisories\/device-code-authentication-phishing<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"8\">KnowBe4. &#8220;What Is Device Code Phishing?&#8221; April 29, 2025. <a class=\"underline\" href=\"https:\/\/blog.knowbe4.com\/what-is-device-code-phishing\">https:\/\/blog.knowbe4.com\/what-is-device-code-phishing<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"9\">Check Point. &#8220;Protecting Your Organization from Device Code Phishing Attacks.&#8221; <a class=\"underline\" href=\"https:\/\/emailsecurity.checkpoint.com\/blog\/protecting-your-organization-from-device-code-phishing-attacks\">https:\/\/emailsecurity.checkpoint.com\/blog\/protecting-your-organization-from-device-code-phishing-attacks<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"10\">Jeffrey Appel. &#8220;How to protect against Device Code Flow abuse (Storm-2372 attacks) and block the authentication flow.&#8221; February 16, 2025. <a class=\"underline\" href=\"https:\/\/jeffreyappel.nl\/how-to-protect-against-device-code-flow-abuse-storm-2372-attacks-and-block-the-authentication-flow\/\">https:\/\/jeffreyappel.nl\/how-to-protect-against-device-code-flow-abuse-storm-2372-attacks-and-block-the-authentication-flow\/<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"11\">Bugcrowd. &#8220;The rise of device code phishing.&#8221; March 11, 2025. <a class=\"underline\" href=\"https:\/\/www.bugcrowd.com\/blog\/the-rise-of-device-code-phishing\/\">https:\/\/www.bugcrowd.com\/blog\/the-rise-of-device-code-phishing\/<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"12\">Dark Reading. &#8220;Beware of Device Code Phishing.&#8221; June 4, 2025. <a class=\"underline\" href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/beware-device-code-phishing\">https:\/\/www.darkreading.com\/vulnerabilities-threats\/beware-device-code-phishing<\/a><\/li>\n<li class=\"whitespace-normal break-words\" index=\"13\">Cloudbrothers. &#8220;Protect your users from Device Code Flow abuse.&#8221; February 27, 2024. <a class=\"underline\" href=\"https:\/\/cloudbrothers.info\/en\/protect-users-device-code-flow-abuse\/\">https:\/\/cloudbrothers.info\/en\/protect-users-device-code-flow-abuse\/<\/a><\/li>\n<\/ol>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>Device code phishing is a sneaky new way hackers are stealing people&#8217;s online accounts. In device code phishing, threat actors exploit the device code authentication flow to capture authentication tokens, which they then use to access target accounts, and further gain access to data and other services that the compromised account has access to. Unlike [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":14630,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-14626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/14626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14626"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/14626\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}