<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Device-Code — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/device-code/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 24 Apr 2026 19:52:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/device-code/feed.xml" rel="self" type="application/rss+xml"/><item><title>Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026</title><link>https://feed.craftedsignal.io/briefs/2026-05-oauth-device-code-phishing/</link><pubDate>Fri, 24 Apr 2026 19:52:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-oauth-device-code-phishing/</guid><description>In early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.</description><content:encoded><![CDATA[<p>In early April 2026, Arctic Wolf observed a widespread phishing campaign that abused the OAuth device code flow. This campaign targeted organizations across multiple regions and sectors, mirroring the &ldquo;Riding the Rails&rdquo; campaign observed by Huntress in late March. The attackers exploited the device code grant type in the OAuth 2.0 authorization framework to obtain access tokens. By tricking users into entering a code on a legitimate Microsoft login page, attackers bypassed traditional MFA controls. Defenders should be aware of this evolving technique and implement detection strategies focused on anomalous application registrations and device code flow activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a phishing email to the victim, impersonating a legitimate service.</li>
<li>The email contains a link that redirects the victim to a fake application authorization page.</li>
<li>The fake page prompts the victim to enter a device code.</li>
<li>Unbeknownst to the victim, the device code is associated with a malicious OAuth application controlled by the attacker.</li>
<li>The victim is redirected to a legitimate Microsoft login page, where they enter the provided code and authenticate.</li>
<li>Upon successful authentication, the malicious application receives an access token.</li>
<li>The attacker uses the access token to access the victim&rsquo;s account and sensitive data.</li>
<li>The attacker may then perform actions such as reading emails, accessing files, or initiating further malicious activity within the compromised account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This OAuth device code phishing campaign affected numerous organizations across multiple sectors and regions in early April 2026. Successful attacks grant threat actors unauthorized access to user accounts, potentially leading to data exfiltration, financial fraud, and further compromise of internal systems. Due to the nature of OAuth, attackers can maintain persistent access even after password changes, posing a significant long-term risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Azure AD sign-in logs for device code flow usage to identify suspicious authentications (logsource: azuread, category: authentication).</li>
<li>Implement the Sigma rule provided below to detect suspicious application registrations in Azure AD (logsource: o365, category: configuration).</li>
<li>Educate users on the risks of device code phishing and how to identify malicious authorization requests.</li>
<li>Regularly audit OAuth applications authorized within your environment and revoke access for any suspicious or unused applications.</li>
<li>Investigate any alerts related to anomalous OAuth application activity promptly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>oauth</category><category>device-code</category><category>phishing</category><category>initial-access</category></item></channel></rss>