Hacking Humans

When legit is the trick: Phishing’s sneaky new moves. [OMITB]

Feb 3, 2026
Attackers are abusing legitimate Microsoft workflows to make phishing more convincing. They explain device code phishing where real OAuth flows hand over access tokens through QR or link lures. The show also covers misuse of Microsoft 365 Direct Send to make emails look internal. Discussion touches on red-team tooling releases and defensive steps like blocking flows and enforcing mail protections.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

TV Setup Analogy Explains User Trust

  • Selena likened device code prompts to setting up a TV where you scan a QR code.
  • That everyday familiarity explains why victims trust the flow and comply.
INSIGHT

Legit OAuth Flows Can Be Weaponized

  • Attackers exploit Microsoft OAuth device code flows to obtain valid access tokens without passwords.
  • The flow looks legitimate, which makes the technique especially deceptive and effective.
INSIGHT

Red Team Tools Accelerated Adoption

  • Red‑team tooling like Squarefish and Graphish moved this technique from niche to widely available.
  • That lowered skill requirements and enabled high-volume automated campaigns.
Get the Snipd Podcast app to discover more snips from this episode
Get the app