Загрузка...

The Phishing Attack That Makes MFA Useless

Learn how device code phishing works and how to detect it: https://www.huntress.com/resources/what-is-device-code-phishing?utm_source=youtube&utm_medium=social

Security Operations Analyst Luke Wilkinson breaks down device code phishing. Attackers abuse a legitimate Microsoft authentication flow built for printers and smart TVs, trick users into completing a real MFA prompt, and walk away with a valid access token to your Microsoft 365 account (no password required). That token can stay valid for 90 days, giving attackers silent access to email, Teams, OneDrive, and SharePoint. The good news: it's detectable if you're watching the right signals in your identity layer.

🔍 Topics: device code phishing | Microsoft 365 | MFA bypass | OAuth token theft | identity threat detection | Huntress SOC | M365 security

———
We wreck hackers. Huntress is a purpose-built platform for organizations like yours, all backed and operated by our industry-proven, 24/7 AI-assisted SOC for continuous threat protection.

We are enterprise-grade cybersecurity for ALL businesses.

Learn more about how Huntress fights cyber threats: https://www.huntress.com/why-huntress?utm_source=youtube&utm_medium=social

Видео The Phishing Attack That Makes MFA Useless канала Huntress
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять