{"id":57413,"date":"2026-04-09T11:18:40","date_gmt":"2026-04-09T01:18:40","guid":{"rendered":"https:\/\/www.cloudproinc.com.au\/?p=57413"},"modified":"2026-04-09T11:18:43","modified_gmt":"2026-04-09T01:18:43","slug":"ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next","status":"publish","type":"post","link":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/","title":{"rendered":"AI-Powered Device Code Phishing Now Bypasses MFA \u2014 What Australian Organisations Must Do Next"},"content":{"rendered":"\n<p>Multi-factor authentication has been the security baseline for years. Most Australian organisations treat it as the final checkpoint \u2014 if MFA is in place, accounts are protected. That assumption just got a serious challenge.<\/p>\n\n\n\n<p>Microsoft Defender Security Research has exposed a widespread phishing campaign that bypasses MFA entirely. It abuses a legitimate feature built into Microsoft&#8217;s identity platform \u2014 the device code authentication flow \u2014 and pairs it with AI-generated lures and automated infrastructure to compromise organisational accounts at scale.<\/p>\n\n\n\n<p>For Australian businesses relying on Microsoft 365, this is not a theoretical risk. It is an active campaign, and it works.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-device-code-phishing\">What Is Device Code Phishing?<\/h2>\n\n\n\n<p>Device code authentication is a legitimate OAuth 2.0 flow designed for devices with limited input capabilities \u2014 smart TVs, printers, IoT endpoints. A user receives a short code, enters it on a separate browser, and authentication completes on the original device.<\/p>\n\n\n\n<p>The problem is that this flow decouples the authentication from the originating session. When a threat actor initiates the flow and sends the code to a victim through a phishing email, the victim unknowingly authorises the attacker&#8217;s session. MFA completes normally \u2014 the user enters their password, approves the push notification \u2014 but the resulting tokens go straight to the attacker.<\/p>\n\n\n\n<p>No credential theft. No password interception. MFA works exactly as designed, and the attacker still gets in.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-this-campaign-is-different\">Why This Campaign Is Different<\/h2>\n\n\n\n<p>Device code phishing is not new. Microsoft documented Storm-2372 running a similar campaign in February 2025. What makes this April 2026 campaign a significant escalation is the level of automation and AI involvement across the entire attack chain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ai-generated-lures\">AI-Generated Lures<\/h3>\n\n\n\n<p>Threat actors are using generative AI to craft hyper-personalised phishing emails. These are not generic &#8220;your password is expiring&#8221; messages. The lures are tailored to the victim&#8217;s role \u2014 RFPs for procurement teams, invoices for finance, manufacturing-specific workflows for operations staff. The days of spotting phishing by poor grammar are over.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-dynamic-code-generation\">Dynamic Code Generation<\/h3>\n\n\n\n<p>Older device code attacks pre-generated codes and embedded them in emails. The 15-minute expiration window meant most codes expired before the victim even opened the message. This campaign solves that problem entirely. The code is generated the instant the victim clicks the link, giving the full 15 minutes from the moment of interaction.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-automated-infrastructure-at-scale\">Automated Infrastructure at Scale<\/h3>\n\n\n\n<p>The attackers are not running a single phishing server. They leverage platforms like Railway.com, Vercel, Cloudflare Workers, and AWS Lambda to spin up thousands of short-lived polling nodes. These are legitimate, high-reputation cloud services \u2014 the same ones many Australian organisations use in production. Traditional domain blocklists and reputation filters do not catch this traffic because it blends in with normal enterprise cloud usage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-browser-in-the-browser-deception\">Browser-in-the-Browser Deception<\/h3>\n\n\n\n<p>The final landing page uses a browser-in-the-browser technique \u2014 a simulated browser window rendered inside the web page. The victim sees what looks like a legitimate Microsoft login prompt, complete with the official microsoft.com\/devicelogin URL. The device code is even automatically copied to the clipboard to reduce friction.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-post-compromise-playbook\">The Post-Compromise Playbook<\/h2>\n\n\n\n<p>What happens after the attacker obtains tokens is just as concerning. The campaign follows a structured post-compromise approach:<\/p>\n\n\n\n<p><strong>Targeted reconnaissance.<\/strong> Attackers use Microsoft Graph API to map the organisational structure, identifying users with financial authority, executive access, or administrative privileges.<\/p>\n\n\n\n<p><strong>Persona filtering.<\/strong> Not every compromised account gets the same treatment. The attackers filter for high-value targets \u2014 CFOs, finance managers, executives \u2014 before investing in deep-dive exfiltration.<\/p>\n\n\n\n<p><strong>Persistence through inbox rules.<\/strong> Malicious inbox rules are created to redirect or hide communications, giving the attacker ongoing visibility into sensitive email threads without the user noticing.<\/p>\n\n\n\n<p><strong>Device registration.<\/strong> In some cases, attackers registered new devices within 10 minutes of compromise, generating Primary Refresh Tokens for long-term persistent access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-this-means-for-australian-organisations\">What This Means for Australian Organisations<\/h2>\n\n\n\n<p>Australian mid-market organisations face a specific set of risks from this campaign.<\/p>\n\n\n\n<p><strong>Essential Eight compliance is not enough on its own.<\/strong> The Essential Eight maturity model recommends MFA, and rightly so. But device code phishing demonstrates that MFA alone does not close every authentication gap. Organisations reporting Essential Eight compliance need to assess whether they have addressed authentication flows that bypass traditional MFA protections.<\/p>\n\n\n\n<p><strong>Microsoft 365 tenants are the primary target.<\/strong> This campaign specifically targets the Microsoft identity platform. Any organisation running Microsoft 365, Azure AD (now Entra ID), or hybrid identity needs to evaluate its exposure to device code authentication abuse.<\/p>\n\n\n\n<p><strong>Cloud-native infrastructure is being weaponised.<\/strong> The use of Railway.com, Vercel, and Cloudflare Workers means traditional perimeter defences and domain reputation services will miss this traffic. Security teams cannot rely solely on URL filtering to catch these attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-five-actions-to-take-now\">Five Actions to Take Now<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-block-device-code-flow-where-it-is-not-needed\">1. Block Device Code Flow Where It Is Not Needed<\/h3>\n\n\n\n<p>Microsoft recommends blocking the device code authentication flow using Conditional Access policies. Most organisations do not have legitimate use cases for this flow. If smart TVs and IoT logins are not part of the environment, disable it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-deploy-phishing-resistant-authentication\">2. Deploy Phishing-Resistant Authentication<\/h3>\n\n\n\n<p>Move beyond push-notification MFA toward FIDO2 security keys or Microsoft Authenticator with passkeys. These methods are resistant to session hijack attacks because they are cryptographically bound to the originating device and URL.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-enable-safe-links-and-anti-phishing-policies\">3. Enable Safe Links and Anti-Phishing Policies<\/h3>\n\n\n\n<p>Microsoft Defender for Office 365 Safe Links can trigger high-confidence device code phishing alerts. Combined with anti-phishing policies that detect impersonation and spoofing, this provides a detection layer before the user ever reaches the phishing page.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-implement-sign-in-risk-policies\">4. Implement Sign-In Risk Policies<\/h3>\n\n\n\n<p>Conditional Access policies based on sign-in risk can automatically block or require re-authentication when anomalous authentication patterns are detected. This includes device code authentication from unusual IP ranges or unfamiliar locations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-monitor-for-post-compromise-indicators\">5. Monitor for Post-Compromise Indicators<\/h3>\n\n\n\n<p>Security operations teams should hunt for the specific indicators Microsoft has published \u2014 suspicious inbox rule creation, anomalous MailItemsAccessed events via Graph API, and device registrations from unexpected sources. Microsoft Sentinel and Defender XDR both provide detection queries for these activities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-bigger-picture\">The Bigger Picture<\/h2>\n\n\n\n<p>This campaign is a preview of where phishing is heading. AI-generated content, dynamic infrastructure, and abuse of legitimate authentication protocols make traditional defences insufficient on their own.<\/p>\n\n\n\n<p>Australian organisations need to treat identity security as a layered discipline \u2014 not a single checkbox. MFA remains essential, but it must be paired with Conditional Access policies, authentication flow restrictions, phishing-resistant credentials, and active threat hunting.<\/p>\n\n\n\n<p>CPI Consulting helps Australian organisations assess and strengthen their Microsoft 365 security posture, including identity protection, Conditional Access design, and threat detection. If this campaign raises questions about your current configuration, our team can help you evaluate your exposure and close the gaps.<\/p>\n\n\n\n<ul class=\"wp-block-yoast-seo-related-links yoast-seo-related-links\">\n<li><a href=\"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/04\/03\/googles-ai-threat-landscape-report-signals-five-risks-every-australian-ciso-should-act-on-now\/\">Google&#8217;s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/02\/23\/ai-recommendation-poisoning-how-attackers-skew-what-your-ai-suggests\/\">AI Recommendation Poisoning How Attackers Skew What Your AI Suggests<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cloudproinc.com.au\/index.php\/2026\/04\/02\/how-ai-is-expanding-the-attack-surface-for-mid-market-organisations\/\">How AI Is Expanding the Attack Surface for Mid-Market Organisations<\/a><\/li>\n\n\n\n<li><a href=\"null\">Identify Azure Users Without MFA Using PowerShell<\/a><\/li>\n\n\n\n<li><a href=\"null\">Creating a Text-to-Speech Power App Using OpenAI Whisper<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Multi-factor authentication has been the security baseline for years. Most Australian organisations treat it as the final checkpoint \u2014 if MFA is in place, accounts are protected. That assumption just got a serious challenge. Microsoft Defender Security Research has exposed a widespread phishing campaign that bypasses MFA entirely. It abuses a legitimate feature built into [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":57416,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"device code phishing","_yoast_wpseo_title":"Device Code Phishing Bypasses MFA \u2014 What Australian Orgs Must Do","_yoast_wpseo_metadesc":"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.","_yoast_wpseo_opengraph-title":"AI-Powered Device Code Phishing Now Bypasses MFA","_yoast_wpseo_opengraph-description":"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.","_yoast_wpseo_twitter-title":"AI-Powered Device Code Phishing Now Bypasses MFA","_yoast_wpseo_twitter-description":"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[24,13,107,36,17],"tags":[],"class_list":["post-57413","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-blog","category-cybersecurity","category-entra-id","category-microsoft-365-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Device Code Phishing Bypasses MFA \u2014 What Australian Orgs Must Do<\/title>\n<meta name=\"description\" content=\"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-Powered Device Code Phishing Now Bypasses MFA\" \/>\n<meta property=\"og:description\" content=\"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/\" \/>\n<meta property=\"og:site_name\" content=\"CPI Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-09T01:18:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T01:18:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudproin-e5ddd09d0f1b51fcfd2f-endpoint.azureedge.net\/blobcloudproinf8788b00c9\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CPI Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"AI-Powered Device Code Phishing Now Bypasses MFA\" \/>\n<meta name=\"twitter:description\" content=\"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CPI Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/\"},\"author\":{\"name\":\"CPI Staff\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\"},\"headline\":\"AI-Powered Device Code Phishing Now Bypasses MFA \u2014 What Australian Organisations Must Do Next\",\"datePublished\":\"2026-04-09T01:18:40+00:00\",\"dateModified\":\"2026-04-09T01:18:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/\"},\"wordCount\":1125,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png\",\"articleSection\":[\"AI\",\"Blog\",\"Cybersecurity\",\"Entra ID\",\"Microsoft 365 Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/\",\"name\":\"Device Code Phishing Bypasses MFA \u2014 What Australian Orgs Must Do\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png\",\"datePublished\":\"2026-04-09T01:18:40+00:00\",\"dateModified\":\"2026-04-09T01:18:43+00:00\",\"description\":\"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/09\\\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cloudproinc.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI-Powered Device Code Phishing Now Bypasses MFA \u2014 What Australian Organisations Must Do Next\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#website\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\",\"name\":\"Cloud Pro Inc - CPI Consulting Pty Ltd\",\"description\":\"Cloud, AI &amp; Cybersecurity Consulting | Melbourne\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#organization\",\"name\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"width\":500,\"height\":500,\"caption\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\",\"name\":\"CPI Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"caption\":\"CPI Staff\"},\"sameAs\":[\"http:\\\/\\\/www.cloudproinc.com.au\"],\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/author\\\/cpiadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Device Code Phishing Bypasses MFA \u2014 What Australian Orgs Must Do","description":"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/","og_locale":"en_US","og_type":"article","og_title":"AI-Powered Device Code Phishing Now Bypasses MFA","og_description":"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.","og_url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/","og_site_name":"CPI Consulting","article_published_time":"2026-04-09T01:18:40+00:00","article_modified_time":"2026-04-09T01:18:43+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/cloudproin-e5ddd09d0f1b51fcfd2f-endpoint.azureedge.net\/blobcloudproinf8788b00c9\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png","type":"image\/png"}],"author":"CPI Staff","twitter_card":"summary_large_image","twitter_title":"AI-Powered Device Code Phishing Now Bypasses MFA","twitter_description":"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.","twitter_misc":{"Written by":"CPI Staff","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/#article","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/"},"author":{"name":"CPI Staff","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e"},"headline":"AI-Powered Device Code Phishing Now Bypasses MFA \u2014 What Australian Organisations Must Do Next","datePublished":"2026-04-09T01:18:40+00:00","dateModified":"2026-04-09T01:18:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/"},"wordCount":1125,"commentCount":0,"publisher":{"@id":"https:\/\/www.cloudproinc.com.au\/#organization"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png","articleSection":["AI","Blog","Cybersecurity","Entra ID","Microsoft 365 Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/","url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/","name":"Device Code Phishing Bypasses MFA \u2014 What Australian Orgs Must Do","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png","datePublished":"2026-04-09T01:18:40+00:00","dateModified":"2026-04-09T01:18:43+00:00","description":"AI-powered device code phishing bypasses MFA by abusing legitimate OAuth flows. Learn how Australian organisations can block this attack and protect Microsoft 365 tenants.","breadcrumb":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/#primaryimage","url":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png","contentUrl":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudproinc.com.au\/"},{"@type":"ListItem","position":2,"name":"AI-Powered Device Code Phishing Now Bypasses MFA \u2014 What Australian Organisations Must Do Next"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudproinc.com.au\/#website","url":"https:\/\/www.cloudproinc.com.au\/","name":"Cloud Pro Inc - CPI Consulting Pty Ltd","description":"Cloud, AI &amp; Cybersecurity Consulting | Melbourne","publisher":{"@id":"https:\/\/www.cloudproinc.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudproinc.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cloudproinc.com.au\/#organization","name":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd","url":"https:\/\/www.cloudproinc.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","contentUrl":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","width":500,"height":500,"caption":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd"},"image":{"@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e","name":"CPI Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","caption":"CPI Staff"},"sameAs":["http:\/\/www.cloudproinc.com.au"],"url":"https:\/\/www.cloudproinc.com.au\/index.php\/author\/cpiadmin\/"}]}},"jetpack_featured_media_url":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png","jetpack-related-posts":[{"id":57032,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/02\/16\/the-3-biggest-security-gaps-i-see-in-mid-size-australian-businesses\/","url_meta":{"origin":57413,"position":0},"title":"The 3 Biggest Security Gaps I See in Mid-Size Australian Businesses","author":"CPI Staff","date":"February 16, 2026","format":false,"excerpt":"Most breaches in mid-size businesses don\u2019t happen because of \u201celite hackers\u201d. They happen because of a few predictable gaps. Here are the three I see most often\u2014and how to close them fast.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/02\/post-23.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/02\/post-23.png 1x, \/wp-content\/uploads\/2026\/02\/post-23.png 1.5x, \/wp-content\/uploads\/2026\/02\/post-23.png 2x, \/wp-content\/uploads\/2026\/02\/post-23.png 3x, \/wp-content\/uploads\/2026\/02\/post-23.png 4x"},"classes":[]},{"id":56890,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/01\/23\/implement-zero-trust-with-entra-id-and-intune\/","url_meta":{"origin":57413,"position":1},"title":"Implement Zero Trust With Entra ID and Intune","author":"CPI Staff","date":"January 23, 2026","format":false,"excerpt":"Learn how to implement Zero Trust using Microsoft Entra ID and Intune with practical steps, key policies, and rollout tips. Secure access and devices without slowing users down.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/01\/post-5.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/01\/post-5.png 1x, \/wp-content\/uploads\/2026\/01\/post-5.png 1.5x, \/wp-content\/uploads\/2026\/01\/post-5.png 2x, \/wp-content\/uploads\/2026\/01\/post-5.png 3x, \/wp-content\/uploads\/2026\/01\/post-5.png 4x"},"classes":[]},{"id":57049,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/02\/18\/what-essential-8-compliance-actually-means-for-your-business\/","url_meta":{"origin":57413,"position":2},"title":"What Essential 8 Compliance Actually Means for Your Business","author":"CPI Staff","date":"February 18, 2026","format":false,"excerpt":"Essential 8 isn\u2019t a checkbox. It\u2019s a practical way to reduce ransomware risk, prove due diligence, and avoid expensive security \u201csurprises\u201d as your business grows.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/02\/post-27.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/02\/post-27.png 1x, \/wp-content\/uploads\/2026\/02\/post-27.png 1.5x, \/wp-content\/uploads\/2026\/02\/post-27.png 2x, \/wp-content\/uploads\/2026\/02\/post-27.png 3x, \/wp-content\/uploads\/2026\/02\/post-27.png 4x"},"classes":[]},{"id":57372,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/03\/googles-ai-threat-landscape-report-signals-five-risks-every-australian-ciso-should-act-on-now\/","url_meta":{"origin":57413,"position":3},"title":"Google&#8217;s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now","author":"CPI Staff","date":"April 3, 2026","format":false,"excerpt":"Google's Threat Intelligence Group just published one of the most detailed reports to date on how adversaries are using AI to accelerate attacks. For Australian CISOs, five findings demand immediate attention. The GTIG AI Threat Tracker, published in early 2026 and based on Q4 2025 observations, moves the conversation beyond\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png 1x, \/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png 2x, \/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png 3x, \/wp-content\/uploads\/2026\/04\/googles-ai-threat-landscape-report-five-risks-australian-ciso-cover.png 4x"},"classes":[]},{"id":57219,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/03\/11\/what-agent-365-and-microsoft-365-e7-mean-for-secure-ai-adoption\/","url_meta":{"origin":57413,"position":4},"title":"What Agent 365 and Microsoft 365 E7 Mean for Secure AI Adoption","author":"CPI Staff","date":"March 11, 2026","format":false,"excerpt":"Microsoft\u2019s latest AI and security moves point to a better way to adopt AI at work: make it useful for staff, visible to IT, and governed from day one.","rel":"","context":"In &quot;Agent 365&quot;","block_context":{"text":"Agent 365","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/agent-365\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/03\/post-12.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/03\/post-12.png 1x, \/wp-content\/uploads\/2026\/03\/post-12.png 1.5x, \/wp-content\/uploads\/2026\/03\/post-12.png 2x, \/wp-content\/uploads\/2026\/03\/post-12.png 3x, \/wp-content\/uploads\/2026\/03\/post-12.png 4x"},"classes":[]},{"id":57373,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/02\/how-ai-is-expanding-the-attack-surface-for-mid-market-organisations\/","url_meta":{"origin":57413,"position":5},"title":"How AI Is Expanding the Attack Surface for Mid-Market Organisations","author":"CPI Staff","date":"April 2, 2026","format":false,"excerpt":"The attack surface for mid-market organisations has expanded faster than most security strategies have adapted. AI is not just a tool for defenders. It is now an operational accelerator for attackers \u2014 and the techniques are not science fiction. Google's Threat Intelligence Group, Mandiant, and multiple cybersecurity vendors have documented\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png 1x, \/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png 2x, \/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png 3x, \/wp-content\/uploads\/2026\/04\/from-vishing-to-data-poisoning-ai-expanding-attack-surface-cover.png 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/comments?post=57413"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57413\/revisions"}],"predecessor-version":[{"id":57422,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/57413\/revisions\/57422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media\/57416"}],"wp:attachment":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media?parent=57413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/categories?post=57413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/tags?post=57413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}