Device Code Phishing Attacks
infonews
security
Source: Embrace The RedNovember 21, 2022
Summary
Attackers are using a new phishing technique that exploits OAuth2 Device Authorization Grant (a protocol that lets devices log in by directing users to a website to authorize access) to trick users into granting them access to data, especially as organizations adopt passwordless authentication methods like hardware tokens. The attack begins when an attacker initiates a device code flow by sending a request to a service provider's device code endpoint, such as Microsoft's Azure AD (active directory, a system that manages user identities and permissions).
Classification
Attack SophisticationModerate
Original source: https://embracethered.com/blog/posts/2022/device-code-phishing/
First tracked: February 12, 2026 at 02:20 PM
Classified by LLM (prompt v3) · confidence: 95%