
Nothing is impossible! Persistence in EntraID through device code phishing
This presentation highlights a sophisticated attack method in which device code phishing can be used to introduce new authentication mechanisms such as FIDO security keys into Entra ID accounts.
Tickets
Get your expo ticket now!Topic
Awareness / Phishing / FraudData protection / GDPRWebsecurity / VPN
When & Where
Details
Format:
it-sa insights
Language:
German
Session description
The technique, originally developed by Felix Äppli in 2024, no longer works – but Jan-Tilo Kirchhoff presents an updated version that continues to be successful and demonstrates it live. By exploiting the OAuth2 Device Authorization Grant Flow and the special rights of the FOCI1 client family, it is possible to establish persistent backdoors – without Microsoft recognizing this as a security vulnerability. The presentation provides technical background information, a proof of concept, and concrete protective measures such as conditional access policies and log analysis. The aim is to create a deeper understanding of this underestimated threat and to provide practical recommendations for action.
Compass researched and publi ...
Sponsored by