Microsoft confirms: Hackers can access your account – no password needed

The Orbital10 Team • 11 June 2025

Cyber threats are evolving. Again.


Just when you think your systems are locked down, attackers change tactics – and this time, it’s more sophisticated than ever.


Microsoft has issued a warning about a new wave of cyber attacks targeting businesses like yours. It’s called device code phishing, and unlike traditional phishing attacks, this one doesn’t rely on stealing your password.


In fact, it doesn’t need your password at all.


Here’s how it works


It starts with what looks like a legitimate email. Maybe it’s an invite to a Teams meeting from someone in HR. You click the link, and you're taken to a genuine Microsoft login page – not a fake. Everything feels familiar. Nothing seems wrong.


Then, you're asked to enter a short device code included in the email – supposedly to finish logging in or join the meeting.


But here’s the catch: entering that code doesn't log you in. It logs them in – the attacker. On their device.


And because this happens through Microsoft’s official login flow, it can slip past your multi-factor authentication. The result? Full access to your Microsoft account – without you ever handing over a password.


What’s at stake?


Once inside, attackers can:

  • Read sensitive emails
  • Access private files
  • Impersonate team members
  • Launch internal phishing attacks
  • And maintain access using session tokens, even if you change your password


It’s one of the most deceptive attack methods we’ve seen, because it doesn’t set off the usual red flags. No suspicious links. No fake websites. Just a genuine-looking login page – and a small code that opens the door.


So, how do you stay ahead of this?


At Orbital10, we focus on proactive, layered protection. Here’s what we recommend:


1. Educate your team


Your people are your first line of defence. Make sure they understand that device code logins are rare – and should always be treated with caution. If they receive a code unexpectedly, they should stop and verify it through a trusted channel (not email).


2. Disable device code authentication (if you don’t need it)


If your business doesn’t use device code login for legitimate workflows, disable it. Our team can help you review and harden your authentication policies.


3. Implement conditional access controls


Restrict login attempts to trusted devices, locations, and behaviours. By tightening the net, you reduce the risk of unauthorised access – even if someone falls for a scam.


4. Stay vigilant with real-time monitoring


Use advanced security tools that detect unusual logins, even when credentials aren’t compromised. And make sure you’re logging and reviewing authentications from unknown devices or IPs.


5. Keep security training ongoing


Cyber threats don’t stand still – and neither should your security awareness. Regular training and updates ensure your team stays alert to emerging tactics like this.


Your business deserves better security than “good enough”



At Orbital10, we don’t just react to threats – we help you anticipate them. If you’re concerned about how protected your Microsoft environment is, we can assess your current posture and build a resilient, future-proof strategy around it.


Let’s talk about strengthening your security. Contact us today to stay ahead of what’s next >

Someone dropping an alarm clock into a waste paper bin
by The Orbital10 Team 14 July 2025
Turn Word documents into PowerPoint slides in seconds with Microsoft Copilot — a faster, smarter way to boost team productivity.
A man pulling apart some blinds to peer through suspiciously
by The Orbital10 Team 14 July 2025
Windows 11’s upcoming Onlooker Detection feature could warn you if someone’s snooping on your screen, helping protect your privacy when working in public.
A hand pressing a digital screen and the letters 'AI'
by The Orbital10 Team 14 July 2025
90% of businesses are using Generative AI — are you? Learn how AI is transforming productivity, and what your organisation needs to do next.
Person in front of a laptop looking at their emails with a symbol showing one new email
by The Orbital10 Team 14 July 2025
Phishing scams are impersonating Microsoft more than ever. Learn how to spot the signs, stay alert, and protect your business from cyber threats.
Woman sitting in front of a laptop with her arms in the air shrugging
by The Orbital10 Team 7 July 2025
Learn the key differences between IT Security and Cybersecurity, plus essential steps every business must take to protect data and systems.
Some typing on a laptop with backup clouds dotted around
by The Orbital10 Team 11 June 2025
Ransomware is evolving — and it’s coming for your backups. With attacks at an all-time high, your last line of defence needs to be bulletproof. Discover how immutable backup storage can keep your business protected, even when attackers get in.
A post it note with 'password qwerty' written on it
by The Orbital10 Team 11 June 2025
Weak passwords are still one of the biggest risks to your business – and attackers know it. From “123456” to reused logins, poor password practices make it easy for cyber criminals to get in and cause serious damage. In this blog, we break down why passwords aren’t enough anymore, what better options look like, and how your business can upgrade its login security for good.
A mousetrap
by The Orbital10 Team 12 May 2025
“Free” online tools could be costing you more than you think. File conversion websites may be hiding ransomware or data theft tools. Here’s how to protect your business from this growing cyber threat.
A view of a teams video call between four people, all smiling and a couple of them waving
by The Orbital10 Team 12 May 2025
Tired of saying “next slide, please” in Teams meetings? Microsoft just rolled out a long-awaited update that allows multiple presenters to control slides—making your meetings and webinars run more smoothly than ever. Here's what to expect.
Illustration of a business man on a mobile device with a shadow of a cyber hacker phishing the man
by The Orbital10 Team 12 May 2025
Think your team would never fall for a phishing scam? Think again. 86% of employees say they’re confident in spotting scam emails—but over half have already fallen for one. This blog explores how overconfidence is a hidden cybersecurity threat, and what you can do to protect your business before it's too late.
More posts