Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsWhen Legit Is the Trick: Phishing’s Sneaky New Moves. [OMITB]
When Legit Is the Trick: Phishing’s Sneaky New Moves. [OMITB]
Cybersecurity

Hacking Humans

When Legit Is the Trick: Phishing’s Sneaky New Moves. [OMITB]

Hacking Humans
•February 3, 2026•39 min
0
Hacking Humans•Feb 3, 2026

Why It Matters

As organizations increasingly rely on Microsoft 365, these stealthy phishing techniques exploit built‑in trust relationships, making traditional email‑security controls less effective. Understanding these tactics helps security teams adapt defenses and educate users, protecting critical data and preventing unauthorized access in a rapidly evolving threat landscape.

Key Takeaways

  • •Device‑code phishing exploits Microsoft OAuth device flow.
  • •Squarefish 2 automates large‑scale token‑stealing attacks.
  • •DirectSend lets attackers spoof internal Microsoft 365 emails.
  • •Blocking device‑code flow and conditional access mitigate threats.
  • •User training must focus on token‑request awareness.

Pulse Analysis

The episode opens with a deep dive into a new breed of social engineering that hijacks legitimate authentication mechanisms. Threat actors are weaponising Microsoft’s OAuth device‑code flow, presenting users with familiar QR‑code prompts that appear to add a device or app to their Microsoft 365 account. By disguising the request as a routine HR or benefits notification, attackers coax victims into entering a device token, which then grants the adversary unfettered access to the target’s account. This technique sidesteps classic phishing defenses because the URL and login page are genuine Microsoft domains, making traditional URL‑checking and MFA advice less effective.

The conversation shifts to the tooling that has accelerated this threat. Squarefish 2, an evolution of earlier red‑team software, automates the device‑code phishing chain at scale, lowering the skill barrier for cyber‑criminals and flooding the market with high‑volume token‑theft kits. Simultaneously, Microsoft’s DirectSend feature—designed for printers and legacy apps—has been repurposed to send internal‑looking emails without authentication, allowing attackers to spoof trusted senders and increase the credibility of their lures. These developments illustrate how everyday cloud services can be turned against enterprises, amplifying the impact of both e‑crime and nation‑state campaigns.

To counter these sophisticated abuses, experts recommend a layered approach. Blocking the device‑code grant flow where it isn’t required, tightening conditional‑access policies, and enforcing allow‑list controls can stop the token exchange before it succeeds. Complementary user‑training programs must evolve beyond “don’t click suspicious links” to educate staff on recognizing unsolicited token or QR‑code requests and verifying them through out‑of‑band channels. Together, technical safeguards and heightened awareness create a resilient defense against the growing trend of legitimate‑service phishing.

Episode Description

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss how attackers are increasingly abusing legitimate, trusted Microsoft workflows to make phishing campaigns more convincing and harder to spot. In device code phishing, victims are socially engineered into completing a real Microsoft OAuth login flow, inadvertently granting attackers valid access tokens without ever sharing a password. They also examined abuse of Microsoft 365 Direct Send, which allows threat actors to send phishing emails that appear to originate from inside an organization, reinforcing a broader shift toward weaponizing built-in cloud services rather than relying on obviously malicious infrastructure.

Show Notes

0

Comments

Want to join the conversation?

Loading comments...