
Summary
The rule named 'Microsoft Device Code Phishing' aims to detect phishing attempts that leverage Microsoft's device code authentication mechanism to steal user credentials. In this methodology, attackers create a device code and send it to a target user, persuading them to use the code at the Microsoft device login portal. This rule identifies potential phishing by analyzing inbound messages for specific criteria: it checks that the email sender's domain is not a legitimate Microsoft domain (to confirm the sender is an attacker), looks for the presence of links to device code login pages, and scans the body text for references to 'device code' or patterns resembling valid device codes (specifically nine-character alphanumeric strings). The rule also takes into account whether the email sender is solicited or if the sender has a history of malicious messages without false positives, thereby enhancing its detection capabilities against targeted Phishing attacks that are waged through impersonation and social engineering. The severity of this rule is classified as medium, indicating a notable risk that needs active monitoring.
Categories
- Identity Management
- Cloud
- Web
- Endpoint
Data Sources
- User Account
- Web Credential
- Network Traffic
Created: 2023-02-09