Microsoft: Criminals can access your accounts without your password • Blisstech Solutions

Have you ever felt like just when you’ve nailed your cybersecurity – BAM! – something new comes along to throw a spanner in the works?

That’s exactly what’s happening right now.

There’s a new scam doing the rounds. And it’s catching out businesses just like yours.

The worst part?

Cyber criminals don’t even need your password.

Scary…

It’s called device code phishing. It’s a clever trick that’s becoming more and more popular. Microsoft recently flagged a wave of these attacks, and we’re likely to see many more.

This one’s different to the usual phishing scams you’ve probably heard about. Normally, phishing is all about tricking people into giving away their usernames and passwords on fake websites.

But with device code phishing, scammers play a smarter game.

Instead of stealing your password, they get you to voluntarily give them access to your account. And they do it using real Microsoft login pages, so it looks totally legit.

It usually starts with a convincing email. Maybe it looks like it’s from your HR person, or a colleague, inviting you to a Microsoft Teams meeting. You click the link, and it takes you to a real Microsoft login screen.

Nothing seems out of place.

You’re asked to enter a code. Just a short one, called a “device code.” This code is supplied in the email, and you’re told it’s needed to join the meeting or finish logging in.

Here’s the catch: By entering that code, you’re not logging yourself in… you’re logging them in.

You’re unknowingly giving the attacker access to your Microsoft account on their device. And because the login goes through the proper channels, it can even bypass multi-factor authentication (MFA).

Yep, even if you’ve got extra security in place, they might still get in.

Once they’re in, they can do a lot of damage. Reading your emails, accessing your files, even using your account to trick others in your company. It’s like handing over the keys to your office and you don’t even realise it.

It’s dangerous because it doesn’t look suspicious. You’re on a real Microsoft site, not some suspicious fake. You didn’t click a weird link or enter your password into a phishing form. Everything looks above board… except it’s not.

And because attackers are using legitimate Microsoft login flows, traditional security tools don’t always catch it.

Plus, once they’re in, they can stay in. They don’t need to keep logging in if they’ve captured your session token (that’s a sort of digital “pass” that keeps you logged in behind the scenes). So even changing your password won’t necessarily kick them out right away.

A big question then: How can you protect your business?

Start by getting your team to be extra cautious with login requests. Especially ones that involve entering codes. If you get a device code from someone, stop and think: Did I request this? Do I know for sure this is real?

If you’re not sure, don’t go through with it. Use a separate method, like a direct phone call or your company’s messaging system, to double-check with the person who sent the email.

Remember, real Microsoft logins don’t involve someone else giving you a code to enter. If that ever happens, it’s a red flag.

From a technical side, your IT team (or IT provider) can also tighten things up. If your business doesn’t need device code login as part of its daily operations, it’s safest to turn it off altogether. They can also put in place extra security rules that only allow logins from trusted locations or devices and add security monitoring that will alert them to suspicious logins.

And finally, keep training your people. Good cybersecurity is about awareness. If your team knows what to look out for, they’re much less likely to fall for these kinds of tricks.

Can we help you tighten up your security? Get in touch.

More Content

The BEST protection against ransomware

The BEST protection against ransomware

Ransomware attacks – where hackers steal your data and demand a ransom to give it back – are skyrocketing. You need to have the very best protection in place to keep your data secure. And here’s what that protection is…

Lost for words? Draft with Copilot can help

Lost for words? Draft with Copilot can help

If you struggle to find the right words in an email or post, you’d probably love a little help. Draft with Copilot is exactly that. Here we tell you how it works.

Microsoft’s browser takes back the Edge with streamlined settings

Microsoft’s browser takes the Edge with streamlined settings

Trying to find your way through the Settings menu in Microsoft Edge might leave you overwhelmed but a new update is about to make it easier. Here we tell you how.

Shady character in a mask sitting by computer screens

A new zero-day vulnerability in Windows

Introduction A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document,...

Take action to avoid a devious new phishing scam

Cyber criminals are getting smarter. This recent malware threat is unusually smart. It impersonates a highly trusted brand name to get a foot in the door.

Tech Tip: How to Tidy up Copied Data in Excel

This Tuesday Two Minute Tech-tip shows you how to tidy up data in Excel spreadsheets. Do you have data in a messy format and need to change it so it is organised? Have you ever received data in Excel or in a text file or Word document and wanted to change it from rows...

Data loss? Save yourself a mighty headache

What would you do if all of your business data were lost? You might panic or stare at the screen in disbelief. However, if you're prepared, you'll have a safety net in place in the form of reliable and tested data backup. This means you can quickly restore your data...
How to cheat (the Blue Screen of) Death

The Blue Screen of Death and how to avoid it

The dreaded Blue Screen of Death makes you panic about what happened, how much work you’ve lost, and how long it’ll take to fix. But a lot of the time it’s avoidable… We’ll tell you how.

Be more productive with these Microsoft Edge features

Be more productive with these Microsoft Edge features

In the never-ending mission to be more productive, the latest Microsoft Edge browser could be a powerful ally. We’re telling you about 5 of its best productivity features.

Point-to-point WiFi – How to extend your network across buildings without cables

No wires?  No problem!  Point-to-point Wireless Revolutionises Connectivity for Every Business In today's fast-paced digital world, having a reliable and extensive network is crucial for the success of any business. However, the physical limitations of laying down...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05