Skip to content
Threat Feed
high advisory

Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026

In early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.

In early April 2026, Arctic Wolf observed a widespread phishing campaign that abused the OAuth device code flow. This campaign targeted organizations across multiple regions and sectors, mirroring the “Riding the Rails” campaign observed by Huntress in late March. The attackers exploited the device code grant type in the OAuth 2.0 authorization framework to obtain access tokens. By tricking users into entering a code on a legitimate Microsoft login page, attackers bypassed traditional MFA controls. Defenders should be aware of this evolving technique and implement detection strategies focused on anomalous application registrations and device code flow activity.

Attack Chain

  1. The attacker sends a phishing email to the victim, impersonating a legitimate service.
  2. The email contains a link that redirects the victim to a fake application authorization page.
  3. The fake page prompts the victim to enter a device code.
  4. Unbeknownst to the victim, the device code is associated with a malicious OAuth application controlled by the attacker.
  5. The victim is redirected to a legitimate Microsoft login page, where they enter the provided code and authenticate.
  6. Upon successful authentication, the malicious application receives an access token.
  7. The attacker uses the access token to access the victim’s account and sensitive data.
  8. The attacker may then perform actions such as reading emails, accessing files, or initiating further malicious activity within the compromised account.

Impact

This OAuth device code phishing campaign affected numerous organizations across multiple sectors and regions in early April 2026. Successful attacks grant threat actors unauthorized access to user accounts, potentially leading to data exfiltration, financial fraud, and further compromise of internal systems. Due to the nature of OAuth, attackers can maintain persistent access even after password changes, posing a significant long-term risk.

Recommendation

  • Monitor Azure AD sign-in logs for device code flow usage to identify suspicious authentications (logsource: azuread, category: authentication).
  • Implement the Sigma rule provided below to detect suspicious application registrations in Azure AD (logsource: o365, category: configuration).
  • Educate users on the risks of device code phishing and how to identify malicious authorization requests.
  • Regularly audit OAuth applications authorized within your environment and revoke access for any suspicious or unused applications.
  • Investigate any alerts related to anomalous OAuth application activity promptly.

Detection coverage 2

Detect Suspicious Azure AD Application Registration

high

Detects the creation of new Azure AD applications with suspicious permissions or settings often used in OAuth phishing attacks.

sigma tactics: initial_access techniques: T1189 sources: configuration, o365

Detect High Volume of Device Code Flow Requests

medium

Detects a high number of device code flow requests originating from a single IP address, which may indicate a phishing campaign.

sigma tactics: initial_access techniques: T1189 sources: authentication, azuread

Detection queries are kept inside the platform. Get full rules →