Microsoft has discovered an active device code phishing campaign orchestrated by a threat actor tracked as Storm-2372, which Microsoft assesses with medium confidence aligns with Russia's interests. This campaign has been ongoing since August 2024, with attackers using lures resembling messaging app experiences such as WhatsApp, Signal, and Microsoft Teams to deceive targets. These attacks aim to trick users into logging into productivity apps, allowing Storm-2372 to capture login information and tokens to access compromised accounts.
Storm-2372's targets span government entities, NGOs, IT services, and sectors including technology, defense, telecommunications, health, higher education, and energy/oil and gas across Europe, North America, Africa, and the Middle East. The threat actors exploit the device code authentication flow to capture authentication tokens, gaining access to target accounts, data, and services. This technique enables persistent access as long as the tokens remain valid, making it an attractive attack vector. Researchers have also exposed “BadPilot,” a subgroup aiding Kremlin-backed hackers in global cyberattacks.