Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Agentic AI: Implementing Long-Term Memory
    • Dog walking injuries rise with increased dog ownership
    • Berlin-based Enter secures €20 million for energy efficiency in the real estate sector
    • ‘Big Balls’ No Longer Works for the US Government
    • This Amex Card’s New Welcome Offer Has Me Scratching My Head. Here’s Why
    • IEEE Presidents’ Scholarship Changes Students’ Lives
    • Data Has No Moat! | Towards Data Science
    • MIT develops single-dose HIV vaccine with dual adjuvants
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Wednesday, June 25
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»What is device code phishing, and why are Russian spies so successful at it?
    News

    What is device code phishing, and why are Russian spies so successful at it?

    Editor Times FeaturedBy Editor Times FeaturedFebruary 16, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    Researchers have uncovered a sustained and ongoing marketing campaign by Russian spies that makes use of a intelligent phishing method to hijack Microsoft 365 accounts belonging to a variety of targets, researchers warned.

    The method is named system code phishing. It exploits “system code movement,” a type of authentication formalized within the industry-wide OAuth standard. Authentication by system code movement is designed for logging printers, good TVs, and comparable gadgets into accounts. These gadgets sometimes don’t assist browsers, making it tough to register utilizing extra customary types of authentication, corresponding to coming into consumer names, passwords, and two-factor mechanisms.

    Reasonably than authenticating the consumer immediately, the input-constrained system shows an alphabetic or alphanumeric system code together with a hyperlink related to the consumer account. The consumer opens the hyperlink on a pc or different system that’s simpler to register with and enters the code. The distant server then sends a token to the input-constrained system that logs it into the account.

    System authorization depends on two paths: one from an app or code working on the input-constrained system in search of permission to log in and the opposite from the browser of the system the consumer usually makes use of for signing in.

    A concerted effort

    Advisories from each safety agency Volexity and Microsoft are warning that risk actors engaged on behalf of the Russian authorities have been abusing this movement since at the least final August to take over Microsoft 365 accounts. The risk actors masquerade as trusted, high-ranking officers and provoke conversations with a focused consumer on a messenger app corresponding to Sign, WhatsApp, and Microsoft Groups. Organizations impersonated embody:



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    The résumé is dying, and AI is holding the smoking gun

    June 24, 2025

    Canadian telecom hacked by suspected China state group

    June 24, 2025

    Google unveils Gemini AI features, like select to search, for Chromebook Plus laptops like Lenovo’s new $649+ 14″ flagship with MediaTek’s Kompanio Ultra chip (Antonio G. Di Benedetto/The Verge)

    June 23, 2025

    A profile of Katie Haun, a former federal prosecutor turned a16z partner who later founded Haun Ventures and believes the GENIUS Act will make stablecoins safer (Connie Loizos/TechCrunch)

    June 23, 2025

    Behind Mark Zuckerberg’s sweeping recruitment effort for Meta’s Superintelligence lab, including hundreds of reach outs, $100M+ offers and counter offers, more (Wall Street Journal)

    June 23, 2025

    A look at Apple’s conservative approach to M&A, which may need to change to catch up in AI by acquiring a startup like Perplexity, Cohere, Sierra AI, or Mistral (Mark Gurman/Bloomberg)

    June 23, 2025

    Comments are closed.

    Editors Picks

    Agentic AI: Implementing Long-Term Memory

    June 25, 2025

    Dog walking injuries rise with increased dog ownership

    June 25, 2025

    Berlin-based Enter secures €20 million for energy efficiency in the real estate sector

    June 25, 2025

    ‘Big Balls’ No Longer Works for the US Government

    June 25, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Tech That Prevents Chemotherapy-Induced Nerve Damage

    May 30, 2025

    Lighthouse acquires The Hotels Network to add hospitality marketing capabilities to its commercial platform

    April 19, 2025

    Sustainable living redefined in Vietnam’s Ga.o House by 85 Design

    May 31, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.