No malware required: device-code phishing + Teams as the intrusion surface

No malware. Still owned. đŸ§ŸđŸ”‘đŸ’Ź Device-code phishing + Teams as the “lobby” + stolen OAuth tokens = API-speed SaaS exfil. If you’re hunting binaries, you’re late.

No malware required: device-code phishing + Teams as the intrusion surface
When the ‘attack’ is just
 paperwork and a Teams message.

TL;DR

Key Points

  • Your biggest H1 2026 risk isn’t “malware on laptops” — it’s legitimate access paths: stolen OAuth/refresh tokens and connected apps driving API-scale SaaS exfil (CRM first, then everything integrated to it).

  • Identity persistence is trending toward “no malware required”: device-code phishing + token replay + tenant device registration, plus Teams as a recon/social-engineering/exfil surface that bypasses email-centric controls.

  • Perimeter + supply chain remain the accelerants: edge zero-days/access brokers, weaponized PoCs + post-exploitation frameworks, and wormable npm-style supply chain incidents — so prioritize behavior/sequence detections over CVE signatures alone.


AlphaHunt

Stop doomscrolling, start decisioning. We chewed through the muck so your team doesn’t have to. → Subscribe!

Like this? Forward this to a friend!

(Have feedback? Did something resonate with you? Did something annoy you? Just hit reply! :))


Strategic Overview

This H1 2026 watchlist reflects a shift: attackers increasingly win by operating “inside the rules”—abusing OAuth-connected apps, integration tokens, and collaboration surfaces to move data at scale while looking legitimate. The highest-risk cluster is SaaS token compromise → bulk API export → secret harvesting from SaaS text fields, because one stolen integration token can drive high-volume, low-friction CRM theft and then pivot into email/other SaaS via shared integrations.

At the same time, identity-led compromise without malware is becoming a repeatable playbook: device-code phishing, refresh-token replay, and device registration for durable access. Teams is also a primary intrusion surface for recon and social engineering, with exfil paths through M365 linkages—so you need Teams-specific auditing/protections and cross-tenant anomaly hunting, not only email controls.

Perimeter and supply chain remain accelerants: edge zero-days/access brokers, weaponized PoCs + post-exploitation frameworks, npm propagation, and web framework RCE. The practical strategy is to invest in sequence/behavior detections (new session → high-value action; beaconing + privileged actions) and tighten exploit-speed hygiene (inventory, patch SLAs, centralized edge logs, segmented management planes).


AlphaHunt Converge - Plug in your Flight Crew

Get intelligence where it counts. No dashboards. No detours. AlphaHunt Converge teases out your intent, reviews the results and delivers actionable intel right inside Slack. We turn noise into signal and analysts into force multipliers.

CTA Image

Anticipate, Don’t Chase.

Plug it In!

Prioritized H1 2026 watchlist

Priority activity Initial access (IA) Post-compromise tradecraft / objectives High-signal telemetry to hunt Practical defender takeaways
1) SaaS connected-app token compromise → API-scale CRM data theft + credential harvesting Stolen OAuth access/refresh tokens for a third-party connected app Bulk export of Salesforce objects; keyword-searching exports for secrets (e.g., cloud keys, passwords) Salesforce UniqueQuery spikes (e.g., repeated SELECT COUNT()), unusual “connection user” access, Bulk API job creation + deletion attempts Govern connected apps like Tier-0: minimize scopes, enforce IP restrictions, shorten session lifetimes, rehearse token revocation + rotation, scan SaaS text fields for secrets
2) “Integration blast radius” across SaaS (CRM ↔ email ↔ other apps) Same vendor platform storing multiple integration tokens Pivot from CRM to other integrated services (example: email access limited to integrated accounts) OAuth token revocations/rotations events; anomalous access limited to “integrated subset” users IR playbook should include “revoke everywhere this vendor touches,” not just resetting user passwords; maintain an integration inventory with owners + kill-switch process
3) Device code phishing → token replay + tenant device registration (identity persistence without malware) User tricked into completing device-code flow Graph API collection; internal lateral attempts via additional phishing; device registration to obtain stronger session artifacts Entra sign-ins showing device code flow patterns (e.g., rapid 50199 then success); Device Registration Service events; risky sign-ins correlated to device enrollments Block device code flow where possible; restrict who can register/join devices; rapidly revoke sessions (revokeSignInSessions) on suspicion; enforce risk-based Conditional Access
4) Teams as a primary intrusion surface (recon → social engineering → exfil/persistence) External tenant chat/calls; compromised tenant; abuse of meetings/guest/external access Recon via Graph tooling; delivery of RMM; data collection via Teams/OneDrive/SharePoint linkages Purview Audit + Defender tables (e.g., CloudAppEvents/MessageEvents) for external chat bursts, new external threads, suspicious URL clicks Tighten external access/guest policy; ensure auditing is enabled; deploy Safe Links/Safe Attachments for Teams; hunt on cross-tenant anomalies (not only email)
5) Edge zero-day access brokers (Ivanti CSA-focused) enabling resale + follow-on intrusions Exploitation of multiple zero-days on edge appliances Rootkit + open-source tooling; access monetization/resale; occasional exfiltration/cryptomining Appliance logs (where available) for exploitation artifacts; unusual admin sessions; outbound VPN/commercial VPN usage from edge “Exploit-speed hygiene”: inventory exposed edge, patch SLAs, restrict management surfaces, centralize edge logs, and hunt for post-exploit persistence (webshell/backdoor)
6) Perimeter exploitation waves using weaponized PoCs + open-source post-exploitation frameworks Rapid targeting of VPN/firewall/load balancer/email perimeters Deployment of frameworks (e.g., Cobalt Strike) and open-source backdoors; broad victimology Edge telemetry + network detections for known post-exploitation frameworks; suspicious beaconing after edge access Build detections around follow-on behaviors (C2, lateral movement) rather than CVE signatures alone; segment and monitor management planes
7) Scan spikes as early warning on edge tech (Cisco ASA example) Coordinated internet scanning / brute force against specific login paths Often precedes exploitation/credential attacks when disclosures land Web portal hits to Cisco ASA login paths at abnormal rates; bursts from many source IPs Treat scan spikes as actionable risk signals: rate-limit, temporarily geo/ASN-filter where appropriate, and pre-stage mitigations before patch windows close
8) Wormable npm supply chain → CI/CD credential harvest + self-propagation Compromised developer identity/tokens Credential scanning (PATs/cloud keys), exfiltration, automated injection + republish of packages Lockfile drift; unexpected install-time network egress; GitHub API usage (repo creation) tied to build context Pin to known-good versions; rotate developer credentials fast; enforce phishing-resistant MFA for npm/GitHub; restrict CI egress during dependency resolution
9) High-velocity web framework RCE (React2Shell) → tunneling/backdoors/miners Unauthenticated RCE in React Server Components / Next.js ecosystems Drop tunnelers/downloaders/backdoors; persistence via systemd/cron; opportunistic mining Web server processes spawning curl/wget; creation of new systemd services; hidden directories and modified shell startup files Patch immediately; deploy WAF rules as interim control; hunt for Linux persistence + unusual outbound from web workloads
10) Criminal infrastructure-as-a-service (VDS/RDP marketplaces) enabling “clean” ops at scale Actors rent cloned Windows RDP servers with consistent fingerprints Mass phishing/BEC, password spray, fraud workflows from disposable infra RDP telemetry with repeat host fingerprints (e.g., WIN-BUNS25TD77J); AnyDesk/tooling installs on remote servers Enrich sign-ins with hosting/VDS context; alert on suspicious remote admin tools on “non-corporate” Windows hosts; monitor for credential attacks sourced from rented VDS ranges

Detection Ideas and Suggested Pivots