
Storm-2372 is a sophisticated nation-state threat actor, with moderate to high confidence of Russian origin, that has been conducting an advanced device code phishing campaign against Microsoft 365 environments since August 2024. This threat actor exploits legitimate Microsoft OAuth 2.0 authentication flows to steal user credentials and bypass multi-factor authentication (MFA), gaining persistent access to organizational resources across government, NGO, IT services, defense, telecommunications, healthcare, education, and energy sectors in Europe, North America, Africa, and the Middle East.
1. Threat Actor Profile
Attribution
Name: Storm-2372 (also known as DEV-0586)
Confidence Level: Moderate to High for Russian state-aligned interests
First Observed: August 2024
Last Major Update: February 14, 2025 (ongoing campaign with evolving tactics)
Motivation
State-sponsored cyber operations targeting government and critical infrastructure organizations. The actor demonstrates advanced capabilities focused on long-term access to sensitive organizational data.
2. Attack Overview
Primary Objective
Storm-2372 exploits the device code authentication flow to capture valid Microsoft account access tokens, enabling:
Persistent access to user accounts even with MFA enabled
Lateral movement within organizations
Data exfiltration via Microsoft Graph API
Compromise of email, cloud storage, and other services
Attack Methodology
The campaign leverages a high-trust, low-detection approach combining social engineering with legitimate authentication mechanisms:
Initial Contact: Threat actors establish rapport through third-party messaging platforms (WhatsApp, Signal) or Microsoft Teams, posing as trusted individuals (colleagues, officials, executives)
Phishing Lure: Victims receive invitations to "Microsoft Teams meetings" or requests to review documents via email
Code Request: Clicking the invitation redirects users to a legitimate Microsoft device code authentication page (
microsoft.com/devicelogin)Token Theft: Users enter a numeric/alphanumeric code prompted by the attack, granting attackers a valid access token without triggering MFA warnings
Post-Compromise: Attackers use stolen tokens to:
Access emails and cloud data
Send internal phishing messages from compromised accounts
Harvest additional credentials via keyword searches (passwords, admin tools, secrets)
3. Technical Details
Exploited Authentication Flow
OAuth 2.0 Device Authorization Grant: A legitimate Microsoft security feature designed for devices with limited input capabilities (e.g., smartwatches, IoT devices). Attackers abuse this by tricking users into entering codes they did not initiate themselves.
Attack Indicators
Phishing Lure Characteristics
Email Subject: Professional phrasing referencing urgent meetings or document reviews
Sender Address: Often from Microsoft domain (
microsoft.com) to appear legitimateUrgency Tactics: Claims of "urgent" meetings requiring immediate authentication
Device Code Authentication Page Features
Legitimate Microsoft URL structure:
https://login.microsoftonline.com/common/oauth2/devicecode/{client-id}ormicrosoft.com/deviceloginClean, official Microsoft login interface with no visual indicators of malicious intent
No "report suspicious" or security warning banners
Code Format
The phishing code is alphanumeric and numeric-only, displayed on a legitimate authentication prompt.
4. Evolution of Tactics (February 2025 Update)
New Capabilities Discovered (Microsoft Security Blog, February 14, 2025)
Microsoft Authentication Broker Exploitation:
Since mid-February 2025, Storm-2372 has advanced their technique by:
Using the specific client ID for Microsoft Authentication Broker in device code flows
Receiving refresh tokens that can request additional tokens for device registration services
Registering actor-controlled devices within Entra ID (formerly Azure AD)
Obtaining a Primary Refresh Token (PRT) with full organizational resource access
Lateral Movement Enhancement
Compromised accounts are used to send internal phishing emails ("Document to review" invitations) to colleagues, extending attack reach across organizational networks.
Data Exfiltration Methods
Microsoft Graph API searches for keywords: "password," "secret," "confidential," "ministry," "gov," "teamviewer," "anydesk"
Email content harvesting from search results
Cloud storage access via stolen tokens
5. Target Sectors and Regions
Primary Industries Targeted
Government (federal, state/provincial, local agencies)
Non-Governmental Organizations (NGOs)
IT Services and Technology Companies
Defense and Military Organizations
Telecommunications Providers
Healthcare and Hospitals
Higher Education Institutions
Energy/Oil & Gas Sector
Geographic Reach
Europe: Multiple countries with significant government and enterprise targets
North America: United States, Canada, Mexico
Africa: South Africa, Egypt, Nigeria, Kenya
Middle East: Saudi Arabia, UAE, Israel, Jordan
6. MITRE ATT&CK Framework Mapping
Technique | ID | Description | Storm-2372 Usage |
|---|---|---|---|
Spearphishing Attachment/Link | T1566.001/T1566.002 | Phishing emails with malicious content | Initial access via Teams meeting invitations |
Valid Accounts | T1078 | Using legitimate credentials to access resources | Stolen device code tokens enable account access |
Application Layer Protocol: Web Protocols | T1071.001 | Web-based protocols for data exfiltration | HTTP/HTTPS for authentication flows |
Mail Protocols | T1071.003 | Email protocols for lateral movement | Phishing emails from compromised accounts |
DNS Protocols | T1071.004 | DNS queries for infrastructure support | Domain resolution for Microsoft services |
Modify Authentication Process: Device Code Phishing | T1556.004 | Exploiting device code authentication | Primary attack vector |
7. Indicators of Compromise (IoCs)
Network Indicators
URLs to Monitor:
https://login.microsoftonline.com/common/oauth2/devicecode/*https://microsoft.com/devicelogin/*
Client IDs: Specific Microsoft Authentication Broker client IDs (February 2025+)
Proxies: Regionally-appropriate proxies used to mask attack origins
Account Indicators
Unusual device code authentication requests from unrecognized locations
Login attempts without user-initiated authentication
Multiple failed sign-in attempts following successful compromise
Unexpected access to email, OneDrive, SharePoint from unusual devices
Behavioral Indicators
Email Exfiltration: Microsoft Graph API searches for sensitive keywords
Lateral Movement: Internal phishing emails sent from compromised accounts
Device Registration: New device enrollments in Entra ID (February 2025+)
8. Detection and Monitoring
Recommended Hunting Queries (Microsoft Sentinel/Defender)
Device Code Phishing Detection Query
Newly Registered Devices Query
9. Mitigation and Defense Strategies
Immediate Actions (Microsoft Security Recommendations)
Block Device Code Flow Where Possible
Configure Microsoft Entra ID's device code flow in Conditional Access policies
Block device code authentication wherever not strictly required
Revoke Tokens Upon Compromise Detection
Call
revokeSignInSessionsAPI endpoint immediately if compromise suspectedForce re-authentication via Conditional Access policy for affected users
Implement Sign-In Risk Policies
Automate response to risky sign-ins based on risk level
Block access or force MFA for high-risk sign-ins
Monitor risky sign-in reports in Azure Portal
Deploy Phishing-Resistant MFA
Use FIDO2 security keys
Implement Microsoft Authenticator with certificate-based authentication
Avoid telephony-based MFA (SIM-jacking vulnerability)
Block Legacy Authentication
Use Conditional Access to block legacy auth protocols
Legacy MFA is susceptible to abuse and device code phishing
Long-Term Hardening Measures
Centralized Identity Management
Consolidate identity platforms
Implement Single Sign-On (SSO)
Synchronize all user accounts (except privileged ones) between on-premises and cloud
Credential Hygiene Best Practices
Apply principle of least privilege
Audit privileged account activity
Regular password rotation for sensitive roles
User Education and Awareness
Train users to never enter device codes they did not initiate
Emphasize importance of recognizing legitimate authentication prompts
Educate about social engineering indicators (urgency, authority, secrecy)
Email Security Enhancements
Deploy advanced email filtering for Teams meeting invitations
Analyze sender reputation and domain validation
Implement DMARC, DKIM, and SPF policies
10. References and Further Reading
Primary Sources
Microsoft Threat Intelligence Blog: Storm-2372 conducts device code phishing campaign
Quorum Cyber Threat Intelligence: Device Code Phishing Campaign Analysis
Additional Resources
eSentire Advisory: Device Code Authentication Phishing security advisories
SOCRadar Research: Storm-2372 Russian APT analysis
Volexity: Multiple reports on device code authentication attacks
Black Hills Information Security: Dynamic device code phishing research
Huntress Labs: OAuth 2.0 device code phishing in Google Cloud and Azure
11. Conclusion
Storm-2372 represents a sophisticated, evolving threat to Microsoft 365 environments worldwide. The campaign's effectiveness stems from exploiting legitimate authentication mechanisms rather than traditional vulnerabilities, making detection challenging without specialized monitoring.
Key Takeaways for Organizations
Device code phishing is active and ongoing as of February 2025 with evolving techniques
Russian state-sponsored actor with access to advanced capabilities
Successful attacks against government and critical infrastructure sectors
Lateral movement capability extends beyond initial compromise
February 2025 evolution introduces new persistent access capabilities
Immediate Actions Required
Review and restrict device code authentication flow usage
Implement phishing-resistant MFA (FIDO2, certificate-based)
Deploy detection queries for anomalous device registrations
Conduct user awareness training on device code phishing indicators
Monitor for unauthorized token refresh and device enrollments in Entra ID
Long-Term Recommendations
Centralize identity management across cloud environments
Implement continuous monitoring of authentication logs
Establish threat hunting program focusing on OAuth-based attacks
Maintain updated MITRE ATT&CK mappings for attack detection
Assessment: This campaign poses critical risk to organizations relying heavily on Microsoft 365, particularly government entities and critical infrastructure. Immediate remediation of device code flow usage and implementation of phishing-resistant authentication are essential defensive priorities.
Understand how ATLAS Cyber offers word class detection and response with 0 false positives.