(arcticwolf.com) Large-Scale Device Code Phishing Campaign Abusing OAuth and Phishing-as-a-Service Infrastructure
New large-scale device code phishing campaign abuses OAuth 2.0 Device Authorization Grant to compromise Microsoft 365 accounts. Threat actors leverage Kali365 Live PhaaS platform for automated token theft and post-exploitation.
In brief - Arctic Wolf uncovered a sophisticated phishing campaign targeting multiple sectors, exploiting OAuth device code flow via Kali365 Live PhaaS. Attackers bypass MFA, steal tokens, and create malicious inbox rules to evade detection. Multi-tenant infrastructure and Cloudflare Workers enable scalable operations.
Technically - The campaign abuses the OAuth 2.0 Device Code flow (RFC 8628) to obtain access/refresh tokens without handling credentials or MFA directly. Kali365 Live, a three-tier PhaaS platform, automates lure generation (PDF/Word/Excel/PPT), token theft, and post-compromise actions. Affiliates share captured tokens server-side, enabling persistent Microsoft 365 access. Infrastructure includes Cloudflare Workers for hosting and Telegram-based C2. Post-compromise: inbox rules suppress security alerts; Electron malware manages tokens. IoCs include IPs sharing identical TLS certificates. Requires monitoring OAuth flows and enforcing conditional access policies.
Source: arcticwolf.com/resources/blog/…
#Cybersecurity #ThreatIntel
Arctic Wolf recently observed a large scale device code phishing campaign leveraging the Kali365 phishing‑as‑a‑service platform to obtain initial access and conduct follow-on activity.
Arctic Wolf Labs (Arctic Wolf)
Catalin Cimpanu
in reply to Catalin Cimpanu • • •-Meta installs spyware on employee's systems
-GitHub CLI now collects telemetry
-GitHub unreachable in Kazakhstan
-NCSC announces SilentGlass device
-Russia revokes almost 2,000 telco licenses
-Two privacy bills arrive in Congress
-CyberCom carried out 8k operations last year
-100+ countries have spyware now
-HexDex arrested in France
-US charges scam compound operators
-UNC6692 behind Teams social engineering attacks
-Hidden prompt injections found in the wild
-CDE exposure reaches 8.8k
Catalin Cimpanu reshared this.
Catalin Cimpanu
in reply to Catalin Cimpanu • • •-ZionSiphon is AI-generated
-Mirai botnet goes after old D-Links
-New OLUOMO phishing kit
-New Devil NFC MaaS
-New HexagonalRodent and Geo Likho APTs
-UAT-4356 never left Cisco ASA firewalls
-Qihoo has a Mythos-scale rival
-Nextcloud stops bug bounty program due to AI flood
-LMDeploy bug gets exploited after 12h
-Apple patches notification retention bug
-Oracle April CPU is out
-New Pack2TheRoot vulnerability
-Rust-coreutils security audit
-Cyberinsurers look to cap AI-related payouts
Ulrich Plate
in reply to Catalin Cimpanu • • •