Threat Hunt Repository

10 threat hunts with detection queries and analytics

hunt-2025-042 FP: medium

General Device Code Authentication Visibility

Device code authentication is a legitimate OAuth 2.0 flow designed for input-constrained devices such as IoT hardware and meeting room equipment. Because the flow only requires a user to enter a short code into any browser, threat actors abuse it to phish access tokens without needing to capture credentials. Surfacing all device code authentication events, enriched with device compliance and risk context, provides the baseline visibility needed to detect abuse.

T1528 T1078.004
Entra ID Azure
hunt-2025-043 FP: low

First-Time Device Code Authentication — No Prior Protocol History

A user authenticating via device code for the first time — with no history of the protocol over the preceding 30 days — is a strong behavioural indicator of phishing. Legitimate device code usage is rare in most enterprises and tends to be associated with specific roles or devices. An unexpected first use of the protocol by a regular user is highly suspicious and warrants immediate triage.

T1528 T1566.002
Entra ID Azure