Russian Hackers Exploiting “Device Code Phishing” to Hijack Accounts: Microsoft Raises Alarm

Photo of author
Written By Mae Nelson

Scientific writer

In a recent cybersecurity advisory, Microsoft has shed light on an emerging threat cluster dubbed “Storm-2372” that has been linked to a series of cyber attacks orchestrated by Russian-backed hackers. The tech giant has warned that these attacks, which have been ongoing since August 2024, are targeting a diverse range of sectors, including government, non-governmental organizations (NGOs), information technology (IT) services, technology, defense, telecommunications, health, higher education, and energy/oil and gas.

The “Device Code Phishing” Technique

According to Microsoft’s analysis, the Storm-2372 group has been employing a sophisticated phishing technique known as “device code phishing” to gain unauthorized access to victims’ accounts. This technique exploits the multi-factor authentication (MFA) process by tricking users into approving a malicious login attempt, effectively bypassing the security layer provided by MFA.

The device code phishing attack typically begins with a phishing email or message that lures the victim into visiting a malicious website designed to mimic a legitimate login page. Once the victim enters their credentials, the site prompts them to enter a device code, which is a temporary code used to authenticate a new device or application.

However, unbeknownst to the victim, this device code is actually being used by the attackers to initiate a login attempt on the victim’s account from a device they control. If the victim approves the login request, thinking it’s a legitimate authentication prompt, the attackers gain full access to the account and its associated data.

Widespread Targeting and Advanced Capabilities

Microsoft’s report highlights the wide range of sectors targeted by Storm-2372, underscoring the group’s advanced capabilities and diverse interests. The tech giant has observed these attacks targeting various organizations worldwide, suggesting a well-resourced and persistent threat actor.

See also  American team's breakthrough may turn CO2 into fuel: A dream for a greener future

In addition to the device code phishing technique, the Storm-2372 group has demonstrated proficiency in deploying other malicious tools and tactics. These include the use of Anchor malware, which is designed to establish persistent access to compromised systems, as well as techniques for credential theft and lateral movement within compromised networks.

Microsoft’s detailed report provides a comprehensive analysis of the group’s operations, indicators of compromise, and recommended mitigation strategies for organizations to protect themselves against these sophisticated attacks.

Defending Against Device Code Phishing Attacks

To mitigate the risks posed by device code phishing attacks, Microsoft and other cybersecurity experts recommend implementing strong security measures and raising awareness among employees. Some key recommendations include:

  1. Implementing robust multi-factor authentication (MFA) solutions that rely on secure methods like hardware tokens or biometric authentication, rather than solely relying on device codes.
  2. Conducting regular security awareness training for employees to recognize and report suspicious phishing attempts.
  3. Deploying advanced threat protection solutions that can detect and block malicious websites and phishing attacks.
  4. Keeping software and systems up-to-date with the latest security patches and updates.
  5. Enforcing strong password policies and encouraging the use of password managers to minimize the risk of credential theft.

By staying vigilant and implementing comprehensive security measures, organizations can better protect themselves against the evolving tactics employed by threat actors like Storm-2372.

Original Source: https://thehackernews.com/2025/02/microsoft-russian-linked-hackers-using.html