<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tycoon2FA — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/tycoon2fa/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 10:04:48 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/tycoon2fa/feed.xml" rel="self" type="application/rss+xml"/><item><title>Entra ID OAuth Device Code Phishing via AiTM</title><link>https://feed.craftedsignal.io/briefs/2026-05-entra-device-code-phishing/</link><pubDate>Mon, 18 May 2026 10:04:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-entra-device-code-phishing/</guid><description>Detects successful Microsoft Entra ID sign-ins using the OAuth device code authentication protocol with the Microsoft Authentication Broker client requesting first-party Office API resources, indicative of adversary-in-the-middle (AiTM) phishing attacks such as Tycoon 2FA.</description><content:encoded><![CDATA[<p>This detection identifies a specific pattern associated with adversary-in-the-middle (AiTM) phishing campaigns targeting Microsoft Entra ID. It focuses on successful sign-ins utilizing the OAuth device code authentication protocol in conjunction with the Microsoft Authentication Broker client. A key characteristic is the request for first-party Office API resources, specifically Exchange Online, Microsoft Graph, or SharePoint. The activity is flagged as interactive. This tactic is linked to AiTM phishing kits like Tycoon 2FA, where unsuspecting victims are tricked into completing device code flows, ultimately granting attackers access tokens for mail and collaboration APIs. This allows unauthorized access to sensitive data and resources within the organization&rsquo;s cloud environment. The blog post from Microsoft on February 13, 2025, highlights the Storm-2372 campaign which utilizes this technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a phishing email or message to the victim containing a link or QR code.</li>
<li>The victim clicks on the link or scans the QR code, which redirects them to a fake Microsoft login page controlled by the attacker.</li>
<li>The fake login page prompts the victim to enter a device code.</li>
<li>The attacker initiates a legitimate OAuth device code flow using the Microsoft Authentication Broker client.</li>
<li>The victim enters the device code on the attacker-controlled page, unknowingly authorizing the attacker&rsquo;s application.</li>
<li>The attacker&rsquo;s application requests access to first-party Office API resources, such as Exchange Online (resource ID 00000002-0000-0ff1-ce00-000000000000), Microsoft Graph (00000003-0000-0ff1-ce00-000000000000), or SharePoint (00000005-0000-0ff1-ce00-000000000000).</li>
<li>The Microsoft Authentication Broker authenticates the request as interactive.</li>
<li>The attacker gains access to the victim&rsquo;s mail and collaboration APIs via the obtained access tokens, enabling data exfiltration and other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to unauthorized access to the victim&rsquo;s Microsoft Entra ID account and associated resources, including email, files, and other sensitive data. This can result in data theft, financial loss, and reputational damage to the organization. The Tycoon 2FA kit, as referenced, facilitates this type of attack, bypassing traditional multi-factor authentication methods. The scale of impact depends on the scope of access granted to the compromised account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Entra ID OAuth Device Code Phishing via AiTM&rdquo; to your SIEM to detect suspicious device code authentication flows.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on <code>azure.signinlogs.properties.user_principal_name</code>, <code>azure.signinlogs.properties.session_id</code>, <code>source.ip</code>, and <code>azure.signinlogs.properties.resource_display_name</code>.</li>
<li>Implement conditional access policies to restrict device code flows to trusted networks and devices, mitigating the risk of AiTM attacks (reference: Microsoft documentation on conditional access).</li>
<li>Revoke refresh tokens for any compromised users and reset their credentials per policy, as mentioned in the investigation steps.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cloud</category><category>identity</category><category>azure</category><category>entra_id</category><category>phishing</category></item></channel></rss>