IAMRoadmapIAMRoadmap
INDUSTRY TRENDS

IAM News: Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Cybersecurity researchers are calling attention to an active device code phishing campaign that's targeting Microsoft 365 identities across more than 340 organi

2 min readMarch 25, 2026IAM Roadmap Team

Key Insight

Cybersecurity researchers are calling attention to an active device code phishing campaign that's targeting Microsoft 365 identities across more than ...

📰 Source: The Hacker News

Summary

A device code phishing campaign has been targeting Microsoft 365 identities across over 340 organizations in the U.S., Canada, Australia, New Zealand, and Germany. The campaign, first spotted on February 19, 2026, leverages OAuth abuse to gain unauthorized access to user accounts. This attack highlights the importance of robust identity and access management (IAM) practices.

Attack Flow

Uses Phishing URL

Enters Credentials

Abuses OAuth

Attacker

User Clicks on Phishing Link

OAuth Authorization Flow

Unauthorized Access to User Account

IAM Impact

This attack demonstrates the risks associated with OAuth abuse and the importance of proper IAM practices. In this scenario, the attacker exploited the OAuth authorization flow to gain unauthorized access to user accounts. This highlights the need for organizations to implement robust IAM controls, such as:

  • Prompting users for consent: Ensure that users are prompted for consent before granting access to sensitive resources.
  • Implementing conditional access: Use conditional access policies to restrict access to sensitive resources based on user identity, location, and device.
  • Monitoring OAuth activity: Regularly monitor OAuth activity to detect and respond to potential security incidents.

Key Takeaways

  • OAuth abuse is a significant threat: OAuth abuse can be used to gain unauthorized access to user accounts, highlighting the need for robust IAM controls.
  • User education is crucial: Educate users on the risks associated with phishing attacks and the importance of verifying the authenticity of requests.
  • Regularly review IAM policies: Regularly review and update IAM policies to ensure they are aligned with the organization's security requirements.

Recommendations

  • Implement multi-factor authentication: Require users to use multi-factor authentication to access sensitive resources.
  • Use Azure AD Conditional Access: Implement Azure AD Conditional Access policies to restrict access to sensitive resources based on user identity, location, and device.
  • Monitor OAuth activity: Regularly monitor OAuth activity to detect and respond to potential security incidents.
Trend Topics
IAM newssecurity newsThe Hacker News
All Articles