Government actors are misusing OAuth device codes to gain full M365 account access – here’s what we know


  • Proofpoint reports phishing surge abusing Microsoft OAuth 2.0 device code flow
  • Victims enter codes on real Microsoft domains, giving attackers access tokens
  • Proofpoint recommends blocking entity code streams

Cybercriminals, including state-sponsored threat actors, are increasingly abusing Microsoft’s OAuth 2.0 device code authentication flow to take over Microsoft 365 accounts.

This is according to a new report from cyber security researchers Proofpoint. In a new paper published on December 18, researchers confirm that since September 2025, there has been a sharp escalation in social engineering attacks, where victims are tricked into giving access to their accounts.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top