PULSE NAME
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication
WHITE CozyLarch, UTA0304, UTA0307 AlienVault 2025-02-14 Modified: 2025-03-16
7
IOCs
LOW VOLUME
Russian threat actors are conducting social-engineering and spear-phishing campaigns to compromise Microsoft 365 accounts using Device Code Authentication phishing. This method has proven more effective than traditional techniques. Campaigns have targeted organizations with politically-themed lures, impersonating entities like the US Department of State and Ukrainian Ministry of Defence. Three distinct threat actors (UTA0304, CozyLarch/APT29, and UTA0307) have been identified using similar tactics but with slight variations in their approach and infrastructure. The attacks exploit users' unfamiliarity with the Device Code Authentication process, making it challenging to recognize as phishing. Detection methods and preventive measures are available but often not implemented by organizations.
Indicators of Compromise (7)
All domain
TYPEINDICATORDESCRIPTIONCREATED
domain afpi-sec.com 2025-02-14
domain androidstatics.com 2025-02-14
domain chromeelevationservice.com 2025-02-14
domain comms-net.com 2025-02-14
domain rosejob.com 2025-02-14
domain sen-comms.com 2025-02-14
domain udc30soft.co 2025-02-14