Get the latest tech news

What is device code phishing, and why are Russian spies so successful at it?


Overlooked attack method has been used since last August in a rash of account takeovers.

These devices typically don’t support browsers, making it difficult to sign in using more standard forms of authentication, such as entering user names, passwords, and two-factor mechanisms. It appears that these Russian threat actors have made a concerted effort to launch several campaigns against organizations with a goal of simultaneously abusing this method before the targets catch on and implement countermeasures.” Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords.

Get the Android app

Or read this on ArsTechnica

Read more on:

Photo of Russian

Russian

Photo of Russian spies

Russian spies

Photo of device code phishing

device code phishing

Related news:

News photo

US Releases Russian Cybercriminal As Part of Prisoner Swap

News photo

China aids Russian drone production with smuggled Western parts, says Estonia

News photo

BadPilot network hacking campaign fuels Russian SandWorm attacks