Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts
Microsoft Threat Intelligence Center has identified an ongoing and highly effective device code phishing campaign attributed to Storm-2372, a suspected Russian state-affiliated threat actor. Active since August 2024, this campaign has successfully targeted organizations across various critical sectors, including government, non-governmental organizations, IT services, defense, telecommunications, healthcare, higher education, and the energy industry—including oil and gas. With operations spanning Europe, North America, Africa, and the Middle East, Storm-2372 strategically focuses on entities that hold sensitive data or play key roles in critical infrastructure. Microsoft assesses with medium confidence that this activity aligns with Russian state interests based on its targeting patterns and operational techniques.
Storm-2372 employs sophisticated social engineering tactics to gain initial access to victim accounts. The actor first engages targets via messaging platforms like WhatsApp, Signal, and Microsoft Teams, impersonating trusted individuals or industry figures to build rapport. Once trust is established, they send phishing emails masquerading as Microsoft Teams meeting invitations, tricking recipients into authenticating via a device code—a legitimate authentication mechanism designed for input-constrained devices that cannot perform interactive web-based sign-ins. When a victim enters the attacker-provided code on a legitimate Microsoft sign-in page, Storm-2372 captures the authentication tokens, granting them unauthorized access to the target’s account and associated services. These tokens allow the attacker to maintain persistent access without needing the victim’s password, as long as the tokens remain valid.
Post-compromise, Storm-2372 rapidly expands its foothold within an organization by leveraging compromised accounts to send additional phishing emails, enabling lateral movement. The group has been observed using Microsoft Graph API to conduct reconnaissance, searching compromised inboxes for sensitive keywords such as "username," "password," "admin," "credentials," "secret," "ministry," and "gov." Once relevant data is identified, the attacker exfiltrates the information using API-based email harvesting techniques. By exploiting valid authentication tokens, Storm-2372 bypasses traditional credential-based security measures, making detection more challenging.
Security Officer Comments:
Given the severity and persistence of this campaign, Microsoft continues to track Storm-2372 closely, notifying affected organizations and sharing detection and mitigation strategies. The company is also monitoring other threat actors employing similar device code phishing techniques, as documented in recent research by Volexity. To defend against such attacks, organizations are urged to implement conditional access
Suggested Corrections:
To harden networks against the Storm-2372 activity described above, defenders can implement the following:
Link(s):
https://www.microsoft.com/en-us/sec...-2372-conducts-device-code-phishing-campaign/