How Are Russian Hackers Bypassing MFA with Device Code Phishing?

Article Highlights
Off On

Since August 2024, the Russian state-backed advanced persistent threat (APT) group Storm-2372 has employed increasingly sophisticated tactics to bypass multi-factor authentication (MFA) and infiltrate high-value targets. This article delves into the device code phishing technique employed by the group, which allows them to evade typical security measures and maintain persistent access to victims’ accounts. The technique, which exploits the OAuth device authorization flow, makes detection particularly challenging and showcases the evolving landscape of cybersecurity threats.

Sophisticated Phishing Techniques

Device code phishing exploits the OAuth device authorization flow, a protocol initially designed for devices with limited input capabilities like smart TVs and printers. This method diverges from traditional phishing attacks that rely on spoofed login pages. Instead, it leverages legitimate authentication workflows, making it significantly more challenging to detect. Attackers generate a valid device code using platforms like Microsoft Azure, integrating it into phishing lures disguised as urgent meeting invitations. These lures are then sent via email, SMS, or messaging applications like Teams, WhatsApp, and Signal. Once the unsuspecting victim submits the attacker-provided code into a legitimate login portal, the resulting tokens are captured by the attackers, granting them persistent access to the victim’s account without triggering MFA challenges. This novel approach allows the attackers to bypass MFA and capture both access and refresh tokens. Consequently, they can maintain long-term access to compromised accounts. This technique demonstrates a shift in phishing tactics, focusing on exploiting legitimate authentication protocols to evade detection and enhance the effectiveness of cyber attacks.

Targeted Campaigns

Storm-2372’s campaigns are noted for their subtlety and sophistication, often mimicking corporate communication templates, such as Microsoft Teams meeting invitations. This strategic approach lulls targets into a false sense of security by using familiar interfaces. By doing so, they capture tokens, navigate through network infrastructures, scrape emails, compromise additional accounts, and exfiltrate sensitive data via tools like the Microsoft Graph API. These attacks target high-value organizations with access to geopolitical intelligence, economic data, and infrastructure control systems.

The targets of Storm-2372 are strategically selected based on their access to critical information. Government agencies, defense contractors, telecommunications firms, and NGOs involved in humanitarian aid and the energy sector are among the primary victims. Their operations have focused on strategic sectors in Ukraine, Germany, the United States, and the Middle East. Through these campaigns, Storm-2372 seeks to obtain sensitive information that serves Russia’s geopolitical and military objectives. This targeted approach underscores the group’s tactical sophistication and the potential impacts of their cyber espionage activities.

Impersonation and Data Exfiltration

The attackers frequently impersonate high-ranking officials or IT administrators to build rapport before delivering phishing payloads. This impersonation tactic is designed to gain the trust of the target, making them more likely to comply with the attacker’s requests. For instance, a fabricated Teams meeting invite might include a device code labeled as a “meeting ID.” Upon authentication by the victim, the attackers utilize keyword searches within accounts to identify and exfiltrate high-value emails. This method effectively bypasses traditional email security measures by exploiting sanctioned APIs, such as the Microsoft Graph API.

Once inside the victim’s account, the attackers search for keywords like “credentials,” “ministry,” or “admin” to locate valuable information. This allows them to identify sensitive data and exfiltrate it without triggering typical security alerts. By leveraging legitimate APIs for data extraction, Storm-2372 can operate covertly within compromised networks. This method of data exfiltration showcases the attackers’ ability to adapt their techniques to evade detection and maximize the impact of their campaigns. It also highlights the need for robust security measures to detect and respond to such sophisticated threats.

Adaptive Security Measures

In response to the increasing sophistication of these attacks, security experts recommend adopting adaptive, context-aware defensive measures over static security policies. One recommended approach is the implementation of Conditional Access Policies, which limit logins based on device compliance, geographic location, and user risk profiles. These policies can help mitigate unauthorized access by ensuring that only trusted devices and locations are granted access. Additionally, thorough audits of third-party OAuth applications and the revocation of unnecessary permissions are crucial to reduce the risk of persistence by attackers. Organizations should also replace SMS-based MFA with more secure, phishing-resistant methods such as FIDO2 security keys. These keys provide a higher level of security by requiring physical possession of the authentication device, making it significantly more difficult for attackers to bypass MFA. By adopting these adaptive security measures, organizations can strengthen their defenses against sophisticated phishing techniques like device code phishing. Combining technical controls with continuous monitoring and comprehensive user education enhances the overall security posture and resilience against evolving cyber threats.

User Education and Technological Solutions

Employee training is a critical component of mitigating threats posed by sophisticated phishing techniques. Organizations must continuously evolve training programs to address the specific social engineering tactics used in device code phishing attacks. Users should be educated to verify the legitimacy of unexpected authentication requests, even if they seem to originate from trusted platforms. An emphasis on vigilance and skepticism can help employees recognize potential phishing attempts and avoid falling victim to these attacks. Awareness and understanding are key to building a resilient human firewall within an organization.

Technological solutions also play a pivotal role in bolstering defenses against device code phishing. Implementing browser isolation techniques and real-time session monitoring can help detect anomalous token usage. For instance, Menlo Security’s HEATcheck framework identifies evasive behaviors in browser sessions, blocking malicious activity before token exfiltration occurs. Additionally, analyzing Azure AD sign-in attempts for unrecognized device codes or abnormal token lifetimes can serve as early indicators of compromise. These technological solutions, combined with continuous monitoring, provide an additional layer of defense against sophisticated phishing tactics.

Evolving Cybersecurity Landscape

Since August 2024, the Russian state-backed advanced persistent threat (APT) group known as Storm-2372 has developed increasingly refined tactics to bypass multi-factor authentication (MFA) and infiltrate high-value targets. This article explores the device code phishing technique that the group employs, enabling them to sidestep standard security protocols and maintain persistent access to their victims’ accounts. By exploiting the OAuth device authorization flow, this technique makes detection particularly difficult, highlighting the evolving landscape of cybersecurity threats. Storm-2372’s method involves deceiving users into entering device codes that grant access to their accounts, a strategy that complicates traditional detection mechanisms and underscores the growing sophistication of cyber threats. As cybersecurity defenses advance, threat actors like Storm-2372 adapt with new and improved tactics, making it crucial for organizations to stay vigilant and continuously update their security measures. This persistent danger underscores the need for enhanced protective strategies against ever-evolving cyberattack techniques.

Explore more

AI Redefines Software Engineering as Manual Coding Fades

The rhythmic clacking of mechanical keyboards, once the heartbeat of Silicon Valley innovation, is rapidly being replaced by the silent, instantaneous pulse of automated script generation. For decades, the ability to hand-write complex logic in languages like Python, Java, or C++ served as the ultimate gatekeeper to a world of prestige and high compensation. Today, that gate is being dismantled

Is Writing Code Becoming Obsolete in the Age of AI?

The 3,000-Developer Question: What Happens When the Keyboard Goes Quiet? The rhythmic tapping of mechanical keyboards that once echoed through every software engineering hub has gradually faded into a thoughtful silence as the industry pivots toward autonomous systems. This transformation was the focal point of a recent gathering of over 3,000 developers who sought to define their roles in a

Skills-Based Hiring Ends the Self-Inflicted Talent Crisis

The persistent disconnect between a company’s inability to fill open roles and the record-breaking volume of incoming applications suggests that modern recruitment has become its own worst enemy. While 65% of HR leaders believe the hiring power dynamic has finally shifted back in their favor, a staggering 62% simultaneously claim they are trapped in a persistent talent crisis. This paradox

AI and Gen Z Are Redefining the Entry-Level Job Market

The silent hum of a server rack now performs the tasks once reserved for the bright-eyed college graduate clutching a fresh diploma and a stack of business cards. This mechanical evolution represents a fundamental dismantling of the traditional corporate hierarchy, where the entry-level role served as a primary training ground for future leaders. As of 2026, the concept of “paying

How Can Recruiters Shift From Attraction to Seduction?

The traditional recruitment funnel has transformed into a complex psychological maze where simply posting a vacancy no longer guarantees a single qualified applicant. Talent acquisition teams now face a reality where the once-reliable job boards remain silent, reflecting a fundamental shift in how professionals view career mobility. This quietude signifies the end of a passive era, as the modern talent