Phishing Campaigns Exploit Microsoft 365 OAuth Flows in Widespread Account Takeover Attacks
SquarePhish2 and Graphish phishing toolkits are exploiting Microsoft 365 OAuth flows to bypass MFA and compromise enterprise accounts.
SquarePhish2 and Graphish phishing toolkits are exploiting Microsoft 365 OAuth flows to bypass MFA and compromise enterprise accounts.

Dateline: January 29, 2026
A new threat intelligence report reveals the DNS infrastructure behind the SquarePhish2 and Graphish campaigns targeting enterprise Microsoft 365 accounts.
An increase in sophisticated phishing attacks is exploiting Microsoft 365's legitimate OAuth device code authorization flow, enabling threat actors to get around two-factor authentication and compromise enterprise accounts at scale, according to a new executive threat report released today.
These campaigns abuse Microsoft's OAuth 2.0 device authorization grant flow, a legitimate feature designed for input-constrained devices such as smart TVs and IoT devices. The attacks trick users into authorizing malicious applications by entering device codes on Microsoft's genuine authentication pages, making them nearly impossible to detect with standard phishing filters.
Two phishing toolkits are driving the surge in these attacks:
SquarePhish2, an advanced version of a tool originally published by Dell SecureWorks in 2022, automates the entire OAuth device grant authorization flow. The toolkit integrates QR code functionality, can automatically redirect users to verification pages, and even sends follow-up emails containing verification codes to reinforce the illusion of legitimate multi-factor authentication. Security researchers explain SquarePhish2's user-friendly configuration means it doesn't need much technical expertise, making it open to a wider range of threat actors for sophisticated attacks.
Graphish, shared for free on vetted criminal hacking forums, represents an even more dangerous evolution. The malicious toolkit enables cyberattackers to create convincing phishing pages by using Azure App Registrations and reverse proxy setups. It supports adversary-in-the-middle (AiTM) attacks and can bypass organizational restrictions by verifying malicious applications with Azure, and increases success rates against enterprise accounts.
The campaigns involve both financially motivated cybercriminals and state-aligned actors, demonstrating the technique's appeal across the threat landscape.
TA2723, a financially motivated high-volume credential phishing actor previously known for spoofing Microsoft OneDrive, LinkedIn, and DocuSign, began using OAuth device code phishing in October 2025. The group's campaigns used salary-themed lures with messages such as "OCTOBER_SALARY_AMENDED" and "Salary Bonus + Employer Benefits Reports 25" to entice victims to click malicious URLs.
Security researchers shared insights on how TA2723 used SquarePhish2 in early October campaigns (October 6-8), with later waves potentially shifting to Graphish (October 9-10), which shows rapid adoption and evolution of tactics.
UNK_AcademicFlare, an unknown Russia-aligned threat actor tracked since September 2025, has been using malicious government and military email accounts to build rapport with targets before launching device-code phishing attacks. The group primarily targets government, academic, think tank, and transportation sectors in the US and Europe.
UNK_AcademicFlare's approach is very sophisticated, and the actors conduct outreach from multiple accounts, arranging fictitious meetings or interviews, before sharing links to Cloudflare Workers that spoof OneDrive accounts. This multi-stage social engineering increases the success rate of breaches.
Successful compromise of Microsoft 365 accounts enables threat actors to conduct extensive follow-on activities:
The newly released executive threat report provides expanded indicators of compromise (IoCs) and DNS signals that defenders can use to detect and block these attacks. The DNS infrastructure analysis shows the scope and sophistication of the campaigns' command-and-control networks.
Security teams are urged to download the full threat intelligence report to access detailed DNS indicators that can be incorporated into defensive strategies. These early signals enable organizations to identify malicious infrastructure before attacks reach end users.
Security experts recommend immediate action to protect against these attacks:
Many researchers expect the abuse of OAuth authentication to grow, particularly as organizations adopt FIDO-compliant MFA controls. The shift toward passwordless authentication, while enhancing security in many respects, creates new attack vectors that seasoned threat actors are prepared to exploit.
The widespread availability of tools like SquarePhish2 and Graphish, combined with their ease of use, suggests that OAuth device-code phishing will remain a persistent threat. Organizations that haven't yet addressed this attack vector face a significant risk of compromise.

AI-powered automation transforms incident response by cutting MTTR by 45-55%, turning hours-long investigations into minutes through intelligent triage, automated root cause analysis, and self-healing remediation.

SIEM detects threats through log analysis while SOAR automates response—together they create a powerful defense that cuts incident response times from hours to minutes.

Ivanti releases emergency patches for two critical zero-day vulnerabilities in EPMM that enable unauthenticated remote code execution, with CISA mandating federal agencies to patch by February 1, 2026.