Niagara's Managed Services Provider - Bowes IT Solutions
  • Home
  • About Us
    • Careers
    • Our Story
    • Team
  • Home Page
  • Industries
    • Law Firms
    • Manufacturing & Industrial
    • Non-Profits
    • Professional Services
  • Resources
    • Blog
    • Case Studies
    • Guides & Checklists
    • Webinars / Events
  • Service Areas
    • Beamsville/Smithville/Stoney Creek IT Support
    • Niagara Falls IT Support
    • St. Catharines IT Support
    • Welland IT Support
  • Services
    • Backup & Disaster Recovery
    • Cloud & Microsoft 365
    • Cybersecurity
    • IT Helpdesk & Remote Support
    • Managed IT Services
    • Networking & VoIP
  • Tech Update

Microsoft: Criminals can access your accounts without your password

by glen | Jul 7, 2025 | Tech Update

Microsoft: Criminals can access your accounts without your password

Have you ever felt like just when you’ve nailed your cybersecurity – BAM! – Something new comes along to throw a wrench in the works?

That’s exactly what’s happening right now.

There’s a new scam doing the rounds. And it’s catching out businesses just like yours.

The worst part?

Cybercriminals don’t even need your password.

Scary…

It’s called device code phishing. It’s a clever trick that’s becoming increasingly popular. Microsoft has recently flagged a wave of these attacks, and we can expect to see many more.

This one’s different from the usual phishing scams you’ve probably heard about. Typically, phishing involves deceiving individuals into divulging their usernames and passwords on fake websites.

However, with device code phishing, scammers play a more sophisticated game.

Instead of stealing your password, they trick you into voluntarily giving them access to your account. And they do it using real Microsoft login pages, so it looks completely legit.

It usually starts with a convincing email. Maybe it looks like it’s from your HR person or a colleague inviting you to a Microsoft Teams meeting. You click the link, and it takes you to a real Microsoft login screen.

Nothing seems out of place.

You’re asked to enter a code. Just a short one, called a “device code.” This code is supplied in the email, and you’re told it’s needed to join the meeting or complete the login process.

Here’s the catch: By entering that code, you’re not logging yourself in… you’re logging them in.

You’re unknowingly giving the attacker access to your Microsoft account on their device. And because the login goes through the proper channels, it can even bypass multi-factor authentication (MFA).

Yes, even if you’ve extra security in place, they might still gain access.

Once they’re in, they can do a lot of damage. Reading your emails, accessing your files, and even using your account to trick others in your company. It’s like handing over the keys to your office, and you don’t even realize it.

It’s dangerous because it doesn’t look suspicious. You’re on a real Microsoft site, not some suspicious fake. You didn’t click a weird link or enter your password into a phishing form. Everything looks above board… except it’s not.

And because attackers are using legitimate Microsoft login flows, traditional security tools often fail to catch them.

Plus, once they’re in, they can stay in. They don’t need to keep logging in if they’ve captured your session token (that’s a sort of digital “pass” that keeps you logged in behind the scenes). So even changing your password won’t necessarily kick them out right away.

A big question then: How can you protect your business?

Start by getting your team to be extra cautious with login requests. Especially ones that involve entering codes. If you get a device code from someone, stop and think: Did I request this? Do I know for sure this is real?

If you’re unsure, don’t proceed. Use a separate method, like a direct phone call or your company’s messaging system, to double-check with the person who sent the email.

Remember, real Microsoft logins don’t involve someone else giving you a code to enter. If that ever happens, it’s a red flag.

From a technical side, your IT team (or IT provider) can also tighten things up. If your business doesn’t need device code login as part of its daily operations, it’s safest to turn it off altogether. They can also implement additional security measures that only allow logins from trusted locations or devices.

And finally, keep training your people. Good cybersecurity is about awareness. If your team knows what to look out for, they’re much less likely to fall for these kinds of tricks. Can we help you tighten up your security? Get in touch

Recent Posts

  • The BEST protection against ransomware
  • Your business’s passwords are still too weak
  • Fraud is costing businesses MILLIONS
  • Microsoft: Criminals can access your accounts without your password
  • Searching in Windows 11 is about to get easier… for some

Recent Comments

No comments to show.

Niagara’s Tech Support Services

We approach IT with a simple principle – Keep IT Simple without scrimping on features. We’ve built a proven process that gets IT right every time. Like a Tim Hortons coffee or a MacDonald’s Big Mac. Give your staff the tools they need to succeed.

Enabling only the features you need on technology that grows with your business makes troubleshooting and maintenance a breeze. When you need a new feature, our technology isn’t crippled. We turn it on, document it, monitor it, and your business grows effortlessly.

Don’t leave a critical business component to chance. Talk to us today.

Confidential Information and Password Management Policy

What’s New

The BEST protection against ransomware

The BEST protection against ransomware

by glen | Jul 28, 2025 | Tech Update

« Older Entries

Follow Us

  • Follow
  • Follow

Address

38 Dorothy St.
Welland ON L3B 3V7

Email Us

info@bowesit.com

Call Us

(289) 479-5606