top of page

The New Face of Phishing: How to Protect Your Microsoft 365 Account

  • Mar 31
  • 2 min read

Phishing attacks are becoming increasingly sophisticated, moving beyond simple fake emails to high-tech traps designed to bypass traditional security (including 2FA). Recent trends show a worrying surge in Man-in-the-Middle (AiTM) phishing and device code authentication attacks, specifically targeting Microsoft 365 users.



What is Man-in-the-Middle (AiTM) Phishing?

Unlike traditional phishing, which merely steals your password, an "Adversary-in-the-Middle" attack intercepts your entire login session.

  • How it works: Attackers sit between you and the real login page, capturing your credentials and—critically—your two-factor authentication (2FA) codes in real time.

  • The Red Flag: If you receive unexpected authentication prompts or notice login activity from unfamiliar locations, you may be the target of an active attack.

Device Code Attacks on Microsoft 365

Attackers are now exploiting "device code" flows—a feature originally designed to help users sign in on devices like smart TVs.

Cybercriminals trick users into entering a specific code on a legitimate Microsoft website. Once you enter that code and sign in, you aren't signing yourself in; you are granting the attacker’s device full access to your account. Rule of thumb: Never enter a device code you did not personally initiate.

How to Defend Your Business

  • Phishing-Resistant 2FA: Consider moving away from SMS or app-based codes in favour of FIDO security tokens (like YubiKeys). These are physical keys that are virtually impossible for remote attackers to intercept or bypass.

  • User Vigilance: Your first line of defence is a healthy dose of suspicion. Always verify the sender’s address, scrutinise links before clicking, and never approve a login request you weren't expecting.

  • Advanced Security Features: While Microsoft 365 Basic and Standard offer foundational security, Microsoft 365 Business Premium includes advanced tools like Conditional Access and Defender for Office 365. These features can automatically block many of these sophisticated attacks before they reach your inbox.

Stay Alert

Cyber threats evolve quickly, but with the right tools and a bit of awareness, you can dramatically reduce your risk. If you would like to discuss upgrading your security posture or training your team, get in touch today!

 
 
 

Comments


Swoosh_edited_edited.png

©2021 Johnson IP Technology Ltd.

IT Services Across London and South East England

Privacy Statement

  • Facebook
bottom of page