Microsoft 365 Just Got Invited to the Worst Device Pairing Party Ever
The Funny Summary
Cybercriminals have discovered that if you can’t steal passwords the old-fashioned way, you simply trick people into handing over the Microsoft login tokens themselves. Tycoon2FA is now abusing Microsoft’s legitimate device login process; meaning victims basically MFA-approve their own compromise like they’re pairing a smart TV from JB Hi‑Fi.
The Top (5) Takeaways
Tycoon2FA is back despite law enforcement disruption
The phishing-as-a-service platform was previously disrupted but quickly rebuilt and resumed operations.Attackers are now using device-code phishing
Instead of stealing passwords directly, attackers trick users into authorising rogue devices through Microsoft’s legitimate device login flow used for IoT devices.MFA alone may not stop this attack
Victims complete MFA themselves during the fake process, which grants attackers OAuth access and refresh tokens.The campaign abuses legitimate services
Researchers observed the attacks leveraging Trustifi click-tracking URLs, Cloudflare Workers, and heavily obfuscated JavaScript chains.Defenders should restrict OAuth and monitor Entra logs
eSentire recommends disabling device code flows where possible, restricting OAuth consent, and monitoring Entra authentication logs for suspicious activity.
The Long-From Article
Reference: