Workers.dev Phishing URL in Email — Device Code Campaign Detection
Platform
Data Sources
Related Blog Post
Read the full blog post about this hunt →MITRE ATT&CK
Tactics
Techniques
Threat Actors
Tags
Hunt Hypothesis
Threat actors abusing device code authentication for phishing are hosting their lure pages on Cloudflare Workers domains (*.workers.dev). These domains are rarely seen in legitimate enterprise email and their presence in email URLs could be an indicator of a device code phishing campaign.
Workers.dev URL in Email
Analytic #1Looks for EmailUrlInfo events containing a workers.dev domain and joins back to EmailEvents to surface the full context — sender, subject, recipient, and URL. workers.dev domains are not common in enterprise email and their presence warrants immediate investigation, particularly when combined with device code authentication events from the same user around the same time.
Detection Queries
EmailUrlInfo
| where Url matches regex @"https?://[a-z0-9][a-z0-9\-]*\.workers\.dev"
| join kind=inner EmailEvents on NetworkMessageId
| summarize count() by
Timestamp,
SenderFromAddress,
Subject,
RecipientEmailAddress,
Url
| order by Timestamp desc
Triage Steps
- Verify whether the recipient clicked the link and check for subsequent device code authentication events in SigninLogs for that user
- Inspect the workers.dev URL — look for sub-paths such as /b8184e32fd933ee3 style hashes which indicate per-victim lure pages
- Review the sender address and domain for signs of compromise or spoofing
- Check whether other recipients in the organisation received the same or similar email
- If the user clicked and authenticated, treat as a confirmed token theft — revoke sessions and rotate credentials immediately
- Block the workers.dev subdomain at email gateway and proxy
True Positive Example
{
"log_entry": {
"Timestamp": "2026-01-15T09:22:11Z",
"SenderFromAddress": "invoice@compromised-vendor.com",
"Subject": "Project Proposal - Review Required",
"RecipientEmailAddress": "target.user@contoso.com",
"Url": "https://index-aj9.michelleteh-surgipro-com-sg-s-account.workers.dev/?email=projectproposal",
"count_": 1
}
} Phishing URL clicked by target user. The workers.dev subdomain follows the naming pattern observed across this campaign — accountname-domain-s-account.workers.dev. Correlate with SigninLogs for device code authentications from this user within 15 minutes of this timestamp.