Close Menu
    Facebook X (Twitter)
    • Privacy policy
    • Terms of use
    Facebook X (Twitter)
    The Vanguard
    • News
    • Space
    • Technology
    • Science
    • Engineering
    Subscribe
    The Vanguard
    Technology

    Russian Hackers Exploiting “Device Code Phishing” to Hijack Accounts: Microsoft Raises Alarm

    Mae NelsonBy Mae Nelson14 February 2025Updated:22 December 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In a recent cybersecurity advisory, Microsoft has shed light on an emerging threat cluster dubbed “Storm-2372” that has been linked to a series of cyber attacks orchestrated by Russian-backed hackers. The tech giant has warned that these attacks, which have been ongoing since August 2024, are targeting a diverse range of sectors, including government, non-governmental organizations (NGOs), information technology (IT) services, technology, defense, telecommunications, health, higher education, and energy/oil and gas.

    The “Device Code Phishing” Technique

    According to Microsoft’s analysis, the Storm-2372 group has been employing a sophisticated phishing technique known as “device code phishing” to gain unauthorized access to victims’ accounts. This technique exploits the multi-factor authentication (MFA) process by tricking users into approving a malicious login attempt, effectively bypassing the security layer provided by MFA.

    The device code phishing attack typically begins with a phishing email or message that lures the victim into visiting a malicious website designed to mimic a legitimate login page. Once the victim enters their credentials, the site prompts them to enter a device code, which is a temporary code used to authenticate a new device or application.

    However, unbeknownst to the victim, this device code is actually being used by the attackers to initiate a login attempt on the victim’s account from a device they control. If the victim approves the login request, thinking it’s a legitimate authentication prompt, the attackers gain full access to the account and its associated data.

    Widespread Targeting and Advanced Capabilities

    Microsoft’s report highlights the wide range of sectors targeted by Storm-2372, underscoring the group’s advanced capabilities and diverse interests. The tech giant has observed these attacks targeting various organizations worldwide, suggesting a well-resourced and persistent threat actor.

    See also  Figures' Vision-Language-Action Model: The Future of Humanoid Robots

    In addition to the device code phishing technique, the Storm-2372 group has demonstrated proficiency in deploying other malicious tools and tactics. These include the use of Anchor malware, which is designed to establish persistent access to compromised systems, as well as techniques for credential theft and lateral movement within compromised networks.

    Microsoft’s detailed report provides a comprehensive analysis of the group’s operations, indicators of compromise, and recommended mitigation strategies for organizations to protect themselves against these sophisticated attacks.

    Defending Against Device Code Phishing Attacks

    To mitigate the risks posed by device code phishing attacks, Microsoft and other cybersecurity experts recommend implementing strong security measures and raising awareness among employees. Some key recommendations include:

    1. Implementing robust multi-factor authentication (MFA) solutions that rely on secure methods like hardware tokens or biometric authentication, rather than solely relying on device codes.
    2. Conducting regular security awareness training for employees to recognize and report suspicious phishing attempts.
    3. Deploying advanced threat protection solutions that can detect and block malicious websites and phishing attacks.
    4. Keeping software and systems up-to-date with the latest security patches and updates.
    5. Enforcing strong password policies and encouraging the use of password managers to minimize the risk of credential theft.

    By staying vigilant and implementing comprehensive security measures, organizations can better protect themselves against the evolving tactics employed by threat actors like Storm-2372.

    Original Source: https://thehackernews.com/2025/02/microsoft-russian-linked-hackers-using.html

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMicrosoft Outlook’s New Minimize Button: A Game-Changer for Mobile Email Management
    Next Article Realbotix Releases Advanced AI Vision System for Its Life-Like Humanoid Robots
    Mae Nelson
    • LinkedIn

    Senior technology reporter covering AI, semiconductors, and Big Tech. Background in applied sciences. Turns complex tech into clear insights.

    Related Posts

    Technology

    Panasonic Unveils Revolutionary PIR Flat Wide Detection Sensor Technology

    23 January 2026
    Technology

    Sennheiser’s Revolutionary TV Audio Solution: New Wireless Headphones with Advanced Transmitter Technology

    23 January 2026
    Technology

    AI Robot Prompt Injection: When Your Robot Obeys Signs Instead of You

    23 January 2026
    Add A Comment

    Comments are closed.

    Top stories

    Panasonic Unveils Revolutionary PIR Flat Wide Detection Sensor Technology

    23 January 2026

    Sennheiser’s Revolutionary TV Audio Solution: New Wireless Headphones with Advanced Transmitter Technology

    23 January 2026

    AI Robot Prompt Injection: When Your Robot Obeys Signs Instead of You

    23 January 2026

    Energy Storage Hardware Attracts €1 Billion in Funding Over Three Years

    23 January 2026
    Facebook X (Twitter) Instagram Pinterest
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.