Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Riding the Rails: Threat Actors Abuse Railway.com PaaS as Microsoft 365 Token Attack Infrastructure
Published:
March 20, 2026

Riding the Rails: Threat Actors Abuse Railway.com PaaS as Microsoft 365 Token Attack Infrastructure

By:
Dave Kleinatland
Jamie Levy
Rich Mozeleski
Erin Meyers
Share icon
Glitch effectGlitch effectGlitch effect


Acknowledgments: Special thanks to Casey Smith, Tanner Filip, Matt Kiely, and Aaron Deal for their contributions to this investigation and write-up.


TL;DR: Huntress is monitoring an active device code phishing campaign targeting Microsoft 365 identities across more than 340 organizations in the US, Canada, Australia, New Zealand, and Germany. The first case appeared on February 19, followed by two more on February 24. Then, on March 2, it exploded, and over the past few weeks, it has continued to accelerate with no signs of slowing down, impacting organizations of all types and sizes, from law firms to construction companies.

In our initial analysis of this campaign, we've seen no identical phishing lures or initial domains. While there was some thematic reuse, the variance in lures is unprecedented. Each message was tailored enough to avoid exact duplication. Given this, we believe the campaign is leveraging automation or AI to operate at scale. Because each lure is personalized to its victim while avoiding exact replication, the phishing emails evade email filtering solutions with alarming efficacy. 

We also believe attackers are weaponizing Railway, a Platform-as-a-Service (PaaS) built for vibe coding, to spin up on-demand credential-harvesting infrastructure at machine speed. Railway's prompt-based deployment and troubleshooting features make it trivial to stand up and tear down internet-facing services with minimal friction. While we didn't directly observe threat actors using Railway's AI features in this campaign, we built a prototype to confirm how easily that workflow could accelerate phishing infrastructure deployment and turnover, even at the free tier. Railway effectively hands adversaries a cloud-hosted token harvesting engine that is clean to Microsoft's risk scoring, and whoever is behind this campaign is weaponizing it to full effect.

What also makes this campaign unusual is not just the device code phishing techniques involved, but the variety of techniques observed. Construction bid lures, landing page code generation, DocuSign impersonation, voicemail notifications, and abuse of Microsoft Forms pages are all hitting the same victim pool through the same Railway.com IP infrastructure. The diversity of techniques and lure types raises a question that doesn't have a clean answer: is this one threat actor with an unusually broad toolset, or multiple actors sharing the same backend?



Introduction

On March 2, 2026, the Huntress Security Operations Center (SOC)  surfaced a concerning pattern: a wave of anomalous authentication events across dozens of organizations simultaneously. The pattern was unmistakable: Device code phishing. This technique exploits the OAuth device authorization flow to grant the attacker persistent access tokens, which remain valid even after a password reset. These attempts originated from a narrow block of IP addresses belonging to Railway.com, a PaaS cloud hosting provider most security teams have never had a reason to block.

What followed was a multi-day investigation that revealed a technically sophisticated, operationally mature campaign targeting victims from various business sectors.

This post documents parts of the attack chain, the technical mechanisms behind the credential and token theft, how Railway is being abused as a token replay engine, and what Huntress has done and what companies and their clients can do right now.



Background

What is device code phishing?

OAuth device code phishing exploits a legitimate Microsoft authentication flow designed for input-constrained devices such as smart TVs, printers, and terminals. In normal use, a user visits microsoft.com/devicelogin, enters an 8-character code, and authorizes a device. Attackers weaponize this by generating device codes themselves, then tricking users into entering those codes via phishing lures. When the victim enters the code and approves the authentication prompt, the attacker's backend immediately receives a set of valid OAuth tokens—no password required, no MFA to defeat. The set of tokens includes an access token, which is good for immediate resource access, and a refresh token, which is valid for up to 90 days.

This technique is documented in Huntress' own research on OAuth device code phishing in Azure and Google Cloud, and covered extensively by threat analysts at ANY.RUN.


What is Railway.com?

Railway is a developer-friendly PaaS provider similar to Heroku or Render. Push a container or a GitHub repository, get a public HTTPS endpoint with automatic TLS, scaling, and outbound internet access. Sign-up requires only an email address. Railway's egress IP ranges—162.220.232.0/22 and 162.220.234.0/22—are clean, legitimate cloud provider space. Microsoft Identity Protection has no reason to score logins from these IPs as risky. That is the point.

Railway also reflects a broader shift towards modern cloud platforms, increasingly reducing infrastructure work from simple vibe coding, allowing adversaries to create infrastructure in a fraction of the time with prompts, templates, and a few clicks. In Railway’s case, prompt-based deployment and troubleshooting make it easy to build, test, and expose services quickly. We want to be precise here: Huntress did not directly observe the threat actor using AI-assisted deployment inside Railway during this campaign. What we did observe was abuse of Railway-hosted infrastructure. Separately, when we logged into the platform and built a test deployment to better understand how these authentication attempts may have been exiting Railway, it became clear how little effort would be required to spin infrastructure up or down at scale. That matters because even when AI isn’t visible in the telemetry, platforms that compress setup and operational overhead still help adversaries move faster.


Attack chain overview 

The Railway infrastructure: A token harvesting factory

All authentication abuse observed in our telemetry originates from a narrow block of Railway.com IPs. Three IPs account for roughly 84% of observed events—consistent with a small number of deployed Railway applications, not a botnet.

IP Address

Event Count

Primary Use

162.220.234[.]41

254

Dominant token attack engine

162.220.234[.]66

132

Secondary token attack engine

162.220.232[.]57

97

Third-highest volume

162.220.232[.]99

38

Source of SAML authentication

162.220.232[.]235

15

SAML + OAuth token activity

162.220.232[.]55 

162.220.232[.]223  

162.220.232[.]230

~8

Persistent OAuth (one organization)


Active as of Mar 19

162.220.234[.]32 

162.220.234[.].34 

162.220.234[.].161

~7

Persistent OAuth (one organization) 


Active Mar 6–11


The phishing infrastructure: A separate ecosystem

Upstream of the Railway token-harvesting engine sits a phishing delivery infrastructure that tells its own story. Based on shared intelligence and analyst observations, several technical signatures appear consistently across this campaign.

Abuse of email security vendor URL rewriters

The most significant delivery bypass: the attacker wraps malicious URLs inside legitimate security vendor redirect services. The email arrives with a Cisco, Trend Micro, or Mimecast URL in the body so that the visible link is a trusted vendor domain, not the malicious destination:

  • Cisco Secure Email (secure-web.cisco.com): 5+ instances as first-hop wrapper

  • Trend Micro URL Protection (cas5-0-urlprotect.trendmicro.com):  first hop in multiple chains

  • Mimecast URL Protection (url.us.m.mimecastprotect.com): wraps an intermediate redirect

One observed chain was triple-wrapped: SafeLinks → Trend Micro → Cisco Secure Web → final phishing page. The victim's email security stack sees a Cisco or Trend Micro link and passes it. The attacker is not defeating email security; they're using competitors' deployed infrastructure to launder their links and bypass spam filters.


Multi-hop redirect chains (2–5 hops)

Chain Type

Example Path

2-hop

Compromised site → workers.dev

3-hop

Known-good platform → compromised site → workers.dev

4-hop

Security vendor rewriter → known-good platform → compromised site → workers.dev

4-hop (observed)

customervoice.microsoft.com → [subdomain].vercel.app → sharepoint-thz...workers.dev

The "known-good platforms" in the middle of these chains are compromised websites. These are real businesses whose CMS was vulnerable and injected with redirect pages. These sites carry legitimate domain reputation, making URL inspection at any single hop uninformative. We will discuss the lure using customervoice.microsoft.com a bit later.

Observed tactic: Device code phishing with landing page codes

Most device code phishing we’ve observed in the past used email as a pretext. This campaign is notably different. The observed landing sites prompt the victim to proceed to the legitimate Microsoft device code authentication endpoint and input a provided code in order to read some files. The code is rendered directly on the page when the victim arrives. This is an interesting iteration of the tactic, as, normally, the adversary must produce and then provide the code to the victim. By rendering the code directly on the page, likely by some code generation automation, the victim is immediately provided with the code and pretext for the attack.

The page prompts the user with a “Continue to Microsoft” button, which spawns a pop-up window. In this case, the pop-up is rendering the legitimate Microsoft authentication endpoint. Pop-up windows in the context of phishing often can mean the adversary is using browser-in-the-browser to manipulate the pop-up window’s URL. In this case, the pop-up was confirmed to be the legitimate Microsoft endpoint, which rules out browser-in-the-browser.


Figure 1: Device Code Phishing used as a tactic


Device code phishing is notably different than an adversary-in-the-middle attack because the adversary is not truly “in the middle.” Rather, they are using the legitimate Microsoft device code authentication feature and prompting the user to authenticate under circumstances that the adversary controls. Multi-factor authentication is not an effective mitigation for this attack because the victim inputs the code, then their username and password, and then MFA code if applicable. The resulting authentication generates a token that the attacker can retrieve, thus negating the protection of MFA.


The lure diversity: One campaign or many?

The phishing lure topics observed represent a striking range. Construction RFP lures dominate and the victim list includes 24 construction and trades organizations, suggesting deliberate sector targeting or simple effectiveness in that audience.

Lure Type

Approx. Count

Construction bid proposal / RFP

24

DocuSign / DocSend / Secure Document

23

Business partnership agreement

2

Fake voicemail

2

Employee compensation / benefits

1

Password expiring

1


Observed tactic: Effective phishing lures

Abuse of Microsoft Dynamics 365 “Customer Voice” feature

One of the phishing lures started with the use of a “Customer Voice” form, as mentioned earlier. These forms are a feature of Microsoft Dynamics 365 intended to collect customer feedback. These were identified by their URL beginning with customervoice.microsoft[.]com/Pages/ResponsePage.aspx?id= followed by the unique identifier of the form. The form presented a SharePoint branded landing page:


Figure 2: Example of a Microsoft Dynamics 365 phishing lure leading to SharePoint


Sophisticated “File Download” pages

From the above, the “Access SharePoint” link led to a convincing file download website hosted on vercel[.]app. Other examples of this were seen hosted on amplifyapp[.]com. This style lure requires the user to check at least one file and click “View Selected” to proceed. 


Figure 3: Example of a file download lure


Clicking “View Selected” brings the user to the device code phishing page, as shown in Figure 3. 

Abuse of Cloudflare’s workers.dev platform

Nearly every device code phishing site was observed to be hosted on a Cloudflare workers.dev instance. This platform allows developers to run serverless apps on the Cloudflare platform. This allows the threat actors to bypass DNS and web content filtering as Cloudflare is a trusted platform globally. The workers.dev domains are ephemeral and systematically generated based on the user creating the instance. They appear in this format:

[lure-type]-[3char-id].[username]-[domain]-s-account.workers.dev/[tracking-hash]

  • [lure-type] typically contained the values “adobe”, “docusign”, “index”, “onedrive”, “page”, or “voicemail”

  • [3char-id] is a seemingly random alphanumeric value

  • [username]-[domain] represents a normalized e-mail address where user@domain.com would become user-domain-com

  • [tracking-hash] varied in format between [16 character hex] value, a 32 character hex].[64 character hex]&ab=1, and ?email=(value)

Huntress has reported all of the currently observed workers.dev instances to Cloudflare, and most, if not all, have already been taken down. 

Abuse of third-party services and compromised websites

In an effort to evade e-mail security tools that may rely on URL or domain reputation, the threat actors utilized a variety of third-party services and compromised websites of various organizations. In many cases, the victims were clicking through two or three layers to get to the final stage of the attack. Examples of services seen used in the attacks:

  • wixsite[.].com - web hosting and creation platform for phishing lure site

  • www.taskade[.]com - AI app building platform for phishing lure site

  • app.usewhale[.]io - AI capable document creation platform for phishing lure site

  • r.brandreward[.]com - link tracking/redirection used to hide true link destination

  • 2nco[.[com - URL shortening service used to hide true link destination

  • track.tec35[.]com - link tracking/redirection used to hide true link destination

  • www.hits2babi[.]com - link tracking/redirection used to hide true link destination

  • appspot[.]com - Google’s App Engine for phishing lure site

  • amplifyapp[.]com - AWS Amplify for phishing lure site

  • vercel[.]app - Vercel for phishing lure site

  • amazonaws[.]com - AWS S3 for phishing lure site

In addition to the abuse of known commercially available tools there was a high amount of compromised organization’s websites that were hosting one of the hops in the attack chain. The malicious page was typically hosted off of the main website in a folder with a very generic name like /project/ or /voip/. Others were hosted from a .html file out of the root of the domain.


User agent analysis: The attacker's digital wardrobe

The user agent (UA) strings presented during Railway-sourced authentication events reveal a deliberately curated set of UAs that mimic realistic enterprise browser populations. The replay engine rotates through them to avoid uniform UA detection rules.


User Agent Pattern

Count

Significance

Windows Chrome 145 (no Edge token)

133

Most common single UA

Windows Chrome 146 (no Edge token)

64

Auto-update mimicry

Windows Edge 145 (OS/10.0.26200 = Win11 24H2)

59

Very current build 

Windows Edge 146 (OS/10.0.26200)

52

 


macOS Chrome 145

50

 


Windows Edge 146 (OS/10.0.26100 = Win11 23H2)

29

 


iPhone iOS 18.7 / Safari Version/26.3

31

Synthetic: Version/26 does not exist on iOS 18

Windows Firefox 148

16

 


BAV2ROPC

15

Programmatic ROPC: automated token refresh, not human

Linux Chrome 146 (X11; Linux x86_64)

15

Likely actual Railway server OS leaking through


  • The attacker researched their target demographic. The OS build strings (OS/10.0.26200 = Win11 24H2, OS/10.0.26100 = Win11 23H2, OS/10.0.22631 = Win11 22H2) reflect actual current Windows versioning, not outdated or synthetic values. This is deliberate research, not default tooling behavior.

  • The iPhone UA is a detection opportunity. iPhone OS 18_7 paired with Version/26.3 Note Version/26. iOS 26 is a future version that does not exist in early 2026. A detection rule keying on iPhone OS 18 + Version/26 from cloud provider IP ranges would have high fidelity with very low false positives.

  • BAV2ROPC is programmatic and scheduled, not human. The twice-daily scheduling visible in events (11:00 AM and 8:00 PM) confirms this is an automated script, not a human operator. This is the "set it and forget it" persistence mechanism for high-value targets.

  • Linux Chrome may be indicative of server OS leaking. X11; Linux x86_64 in 15 events may represent API-level token exchanges where the Railway container did not bother to set a spoofed UA and the actual runtime environment is visible.

Scale and victim profile


Metric

Value

Organizations affected

344

Date range

March 2–19, 2026

Primary technique

cmsi session, indicating Device Code Phishing (87.4%)

Countries

US, Canada, Australia, New Zealand, Germany



Sectors targeted


Sector

Org Count

Why It Matters

Construction & Trades

26

Consistent with dominant RFP/bid lure theme

Nonprofit / Social Services

15

Includes child advocacy, senior services, Indigenous organizations

Real Estate

14

Transaction records, wire routing information

Manufacturing

14

Manufacturing companies process large purchase orders, vendor invoices, and supplier wire transfers constantly.


Finance / Insurance

12

Includes private equity, pension admin, insurance claims

Healthcare

11

Medical records, HIPAA-sensitive data

Law Firms

18

#1 by sensitivity: attorney-client privilege, wire instructions, M&A data

Government / Public Safety

8

DA's office, police, fire department, county tax authority

Labor Unions

2

Member PII, collective bargaining strategy, PAC funds

Indigenous / First Nations

4

Land rights, resource agreements, community trust funds



The Huntress response

When Huntress sees threat actors using new tradecraft that is working at scale, we move. To mitigate the threat for our partners, Huntress pushed out a Conditional Access Policy (CAP) to all eligible tenants (i.e., tenants with Microsoft Entra ID P1 and Security Defaults disabled) to prevent logins from all Railway-owned infrastructure, as well as to disrupt the adversary’s access path at the source. This was accomplished by creating a Named Location containing the IPs associated with Railway. We validated that no legitimate activity had been seen from Railway-owned infrastructure in the prior 14 days across our customer base and did our best to ensure negative impact would effectively be zero. This wasn’t a casual call, and it wasn’t made in a vacuum. It went through internal review across our SOC, product, leadership, and customer-facing teams, with careful consideration for both security and operational impact. 

What’s interesting is not that we caught an attacker typing prompts into Railway in real time—we didn’t. It’s that the same product features designed to help legitimate builders move faster can also help adversaries industrialize phishing infrastructure. When a platform makes deployment, troubleshooting, and teardown fast and low-friction, it shrinks the gap between an idea and a live attack service. That’s the real concern: AI-assisted and prompt-driven workflows don’t need to appear explicitly in the logs to still change the speed, scale, and economics of abuse.

When attackers are actively exploiting a fast-moving campaign like this, it stops being a normal change-management discussion and becomes an emergency response decision. Our duty is to protect customers, even when that means acting quickly and decisively against novel tradecraft. When customer environments are at risk, we will continue to take the necessary action to stop active threats. 


What we’re hearing (thoughts from the community)

Before publishing this blog, we shared high-level details about the campaign and protective measures on Reddit. The conversation that followed provided some great feedback, and we want to address two key concerns directly.

Some customers noted they would have appreciated notification or the option to opt-in before this change. That's fair feedback, and it's something we're taking seriously. During an active campaign with credentials being harvested in real time, waiting means leaving customers exposed. In this case, we prioritized stopping the threat immediately. Going forward, we're working on ways to give customers more visibility into these decisions while maintaining our ability to act quickly when threats are actively targeting our customer base.

Customers adhering to CMMC also raised important questions about how this action aligns with compliance requirements. Huntress conducts ongoing consultations with CMMC experts, who've verified that this action is covered under incident response as an SPA.



Response recommendations

Immediate actions

  • Hunt for Railway IP logins. Run the Sentinel queries above against your sign-in logs. Any successful authentication is a confirmed compromise.

  • Revoke all refresh tokens for affected users. Revoke-AzureADUserAllRefreshTokens or Entra ID portal. This, however, does NOT immediately revoke in-flight OAuth access tokens as those expire in ~1 hour unless CAE is enabled.

  • Block Railway CIDR blocks via Conditional Access Named Locations. If no legitimate Railway-deployed applications exist in your environment.


Medium-term hardening

  • Block Device Code Authentication Flows in your Microsoft 365 environment using Conditional Access. Restrict Device Code flow to only the specific identities that need this method.

  • Require a compliant device for Exchange Online / SharePoint. Device code authentication cannot proceed if the device is not compliant when compliant devices are required.

  • Enable Continuous Access Evaluation (CAE). Reduces token revocation latency from ~1 hour to minutes.

  • Train end users on device code lures specifically. Educate users that inputting device codes, even into the legitimate Microsoft authentication endpoint, is not necessarily safe.


Conclusion

Railway.com has lowered the infrastructure cost and operational complexity of device code phishing campaigns at scale. A service that lets an attacker deploy a containerized identity attack framework in minutes- with clean IP reputation, automatic TLS, and no identity verification-  is a material force multiplier for any threat actor interested in scoring a business email compromise payday.

The diversity of techniques and lure types in this campaign, whether one actor with a broad toolkit or multiple actors sharing common infrastructure, points to the same practical challenge for defenders. You cannot block this campaign by domain. You cannot block it by lure type. You can block it by IP range, and you can detect it in authentication telemetry. The attack is visible at the identity layer even when it is invisible at every other layer.

If your Microsoft 365 tenants are not covered by an identity detection and response platform with cross-tenant visibility, this campaign illustrates exactly what you're missing.



Detection queries

Microsoft Sentinel — Railway login hunt (interactive):

SigninLogs

| where IPAddress startswith "162.220.234." or IPAddress startswith "162.220.232."

| where ResultType == 0

| project TimeGenerated, UserPrincipalName, AppDisplayName, IPAddress,

          AuthenticationRequirement, ConditionalAccessStatus

| order by TimeGenerated desc


Hunt for BAV2ROPC programmatic token access from Railway:

AADNonInteractiveUserSignInLogs

| where IPAddress startswith "162.220.232." or IPAddress startswith "162.220.234."

| where UserAgent contains "BAV2ROPC"

| project TimeGenerated, UserPrincipalName, ResourceDisplayName, IPAddress



Indicators of Compromise (IOCs)

All IOCs are defanged. Remove brackets before use in blocking rules.


IP Address

Event Count

Technique

162.220.234[.]41

254

cmsi replay (primary)

162.220.234[.]66

132

cmsi + device code

162.220.232[.]57

97

cmsi replay

162.220.232[.]99

38

SAML replay

162.220.232[.]235

15

SAML + OAuth

162.220.232[.]223

4

OAuth

(active as of Mar 19 across Organization 1)

162.220.232[.]55

3

OAuth

(Organization 1)

162.220.234[.]161

3

OAuth

(Organization 2)

162.220.234[.]34

3

OAuth

(Organization 2)



CIDR blocks for perimeter blocking:

  • 162.220.232[.]0/22

  • 162.220.234[.]0/22

  • 152.55.176.0/20

  • 208.77.244.0/22

  • 66.33.22.0/23

  • 69.46.46.0/24

  • 69.9.164.0/22

  • 2607:99c0::/32


Behavioral authentication IOCs


Signal

Severity

Meaning

cmsi:cmsi from Railway AS IP space

High

Indicator of successful device code authentication.

oauth2:token + BAV2ROPC from Railway AS

Critical

Automated refresh token exchange.


Persistent, scheduled access

iPhone UA with Version/26.x from cloud provider IP

Medium

Synthetic mobile UA high-fidelity detection opportunity









Categories
Response to Incidents
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Understanding Potentially Unwanted Programs Part I — It’s Not Always Malware

    Regardless of your daily duties, we’ve all encountered annoying ads, unwanted pop-ups, or generically named rogue applications. These nuisances, commonly called Potentially Unwanted Programs (PUP), are often unknowingly installed when downloading free software.
  • Critical Vuln.: PrintNightmare Exposes Windows Servers to RCE

    Huntress is aware of PrintNightmare, a critical RCE and local privilege escalation vulnerability. This serious security flaw affects many Windows servers.
  • Creating macOS Ransomware

    With the beta release of the Huntress macOS agent, we wanted to share some of the Apple-y stuff we’ve been up to behind the scenes.
  • Business Email Compromise via Azure Administrative Privileges

    Explore how Huntress stopped a massive business email compromise (BEC) attack targeting multiple user accounts within a single organization.
  • Legitimate Apps as Traitorware for Persistent Microsoft 365 Compromise

    Dive into how Huntress caught a threat actor adding several legitimate email apps to maintain persistent access to a compromised Microsoft 365 environment.
  • 137 Key Cybersecurity Statistics for 2026 and Beyond

    Uncover top cybercrime trends, data breaches, and essential workforce insights to bolster your defenses with this comprehensive roundup of cybersecurity statistics.
  • Pairing SOCs with Automation: You Won’t Be Replaced by a Robot Yet

    We can use automation, detection and response, and open-source software to solve common SOC challenges. Read about simple approaches for SOC automation.
  • The Undeniable Benefits of Healthcare Security Awareness Training

    Discover the benefits of healthcare security awareness training and find out how Huntress can empower your organization with a culture of security.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy