Overview:
Email security threats are constantly evolving. The latest intrusive and dangerous email phishing threat is known as device code phishing. In these attacks, cyber criminals target Microsoft 365 accounts to compromise email systems and to steal sensitive information.
Here's what to know:
Device code phishing exploits a common authentication flow used by devices with limited input options (like smart TVs or certain IoT devices). These devices often require for users to enter a device authentication code on another device (ex. smartphone or computer) in order to authenticate their identity.
However, cyber criminals are co-opting this process to deceive users into entering a code generated by the attacker. Ultimately, this provides attackers with unauthorized and unfettered access to accounts.
How does the attack work?
Tracked by Microsoft as Storm-237, the attackers typically target individuals who work within “high-value” sectors; government, defense, healthcare and energy.
1. Initial contact. Posing as a trusted person, the attackers first establish communication with their target via messaging platforms, like WhatsApp, Signal or Microsoft Teams.
2. Fake meeting invitation. After establishing trust, attackers send a fake meeting invitation that includes a device code. The target is prompted to enter the code on a legitimate sign-in page, unknowingly granting the attacker access to their Microsoft 365 account.
3. Email and data harvesting: Once access to the victim’s account has been gained, the attackers can collect valuable information, including files, emails and other sensitive information.
4. Token exploitation: The attackers leverage the stolen tokens to gain continuous access to Microsoft services, including email and cloud storage, without needing the victim’s password. The access remains valid until the stolen tokens expire.Why this is a growing threat:
Cyber criminals have advanced their techniques by using specific client IDs that interact with Microsoft’s Authentication Broker. This allows for the generation of new tokens and registration of devices within Microsoft’s cloud identity system, Entra ID, making it difficult to detect and block nefarious activities.
Protecting your organization:
To protect your organization from this emerging threat, follow these best practices:
Why this matters for your organization:
Email security threats, like device code phishing, can lead to significant data breaches, unauthorized communications access and financial losses.
At Check Point, we are committed to assisting organizations like yours in remaining ahead of the latest threats. Our solutions can help prevent and detect phishing attacks, including sophisticated device code phishing campaigns.
Get a demo here or please reach out to your local representative for more information about protecting your systems from email security threats.