TL;DR
AI-enabled device-code phishing and OAuth supply-chain breaches (Microsoft EvilTokens, Vercel/Context.ai, April 2026) prove that SSO alone is no longer enough for Australian SMBs. Your identity architecture must include conditional access governance and joiner-mover-leaver (JML) automation, not just SAML federation. Choose Entra ID P1 if you are Microsoft-first, Okta if you run multi-cloud SaaS, and Authentik only if you have in-house DevOps capacity to self-host and patch.
The Threat Context: Identity Is the New Perimeter
Get Our Weekly Cybersecurity Digest
Every Thursday: the threats that matter, what they mean for your business, and exactly what to do. Trusted by SMB owners across Australia.
No spam. No tracking. Unsubscribe anytime. Privacy
Microsoft’s April 2026 disclosure detailed the EvilTokens phishing-as-a-service toolkit, which used dynamic device-code generation to bypass standard 15-minute expiration windows and defeat MFA gating. Around the same period, the Vercel breach showed how a compromised third-party OAuth app (Context.ai) pivoted into corporate Google Workspace sessions, exposing environment variables and enabling persistent inbox rules. For a 10-50 headcount Australian business, the takeaway is blunt: federating passwords via SSO is baseline hygiene. Without device trust, session risk analytics, and automated offboarding, you are one phishing lure away from a business email compromise.
SSO Co
Free Resource
Get the Free Cybersecurity Checklist
A practical, no-jargon security checklist for Australian businesses. Download free — no spam, unsubscribe anytime.
Send Me the Checklist →
verage, Protocols, and SCIM Breadth
Free Resource
Get the Free Cybersecurity Checklist
A practical, no-jargon security checklist for Australian businesses. Download free — no spam, unsubscribe anytime.
Send Me the Checklist →Entra ID P1 ships with roughly 2,800 pre-integrated SAML/OIDC applications and native SCIM provisioning for Microsoft 365, Salesforce, and AWS IAM Identity Center. P2 adds third-party application governance and entitlement management. Okta Workforce Identity remains the integration leader with 7,000+ SAML/OIDC connectors and robust bidirectional SCIM, making it the safer bet if your stack mixes Google Workspace, Slack, Atlassian, and niche vertical SaaS. Authentik supports SAML 2.0 and OIDC natively, but SCIM coverage relies on community providers or manual YAML configuration. If your app portfolio is static and mainstream, Authentik is workable; if you onboard new SaaS monthly, the integration gap will hurt.
Conditional Access and Lifecycle Management
Entra ID P1 delivers location-based, compliant-device, and trusted-named-location policies. P2 upgrades this with Identity Protection, real-time risk detection, and automated access reviews. Okta pairs device trust with ThreatInsight and offers a no-code Workflows engine for JML automation, such as triggering deprovisioning across Slack, Okta, and Google Workspace when your HRIS fires a termination webhook. Authentik provides group and policy primitives, but JML is a build-it-yourself affair: you will script webhooks, write LDAP or REST connectors, and maintain your own offboarding runbooks. For a lean technical lead wearing multiple hats, that engineering tax is real.
ISO 27001 SMB Starter Pack — $97
Everything you need to start your ISO 27001 journey: gap assessment templates, policy frameworks, and implementation roadmap built for Australian SMBs.
Get the Starter Pack →Audit Logging and Operational Overhead
Entra ID sign-in and audit logs feed natively into Microsoft Sentinel or Azure Monitor; P2 retains 30 days of interactive sign-in data by default. Okta’s System Log is API-first and streams easily into Splunk or Sentinel. Authentik emits JSON audit events to file or stdout, but long-term retention and alerting require a self-hosted Loki or ELK stack. If your SMB does not yet run a SIEM, Okta and Entra provide more digestible dashboards out of the box.
At April 2026 pricing, expect:
- Entra ID P1: ~A$9/user/month
- Entra ID P2: ~A$14/user/month
- Okta Workforce Identity: ~A$18/user/month (SSO + lifecycle bundle)
- Authentik: A$0 licensing; infrastructure cost roughly A$80-150/month for VM, backup, and monitoring, plus 4-8 hours/month of senior ops attention.
For a 30-user team, that places Entra P1 at ~A$3,300/year, P2 at ~A$5,000/year, Okta at ~A$6,500/year, and Authentik at ~A$1,500-2,500/year infra-only.
Decision Matrix and Archetype Recommendations
| Capability | Entra ID P1 | Entra ID P2 | Okta | Authentik |
|---|---|---|---|---|
| SAML/OIDC breadth | Very High | Very High | Highest | Moderate |
| SCIM provisioning | Native (MS + major SaaS) | Native + governance | Broad | Manual/YAML |
| Conditional access | Location, device | Risk-based + Identity Protection | ThreatInsight + device | Basic policies |
| JML automation | Graph API/scripts | Identity Governance | Workflows (low-code) | DIY scripts |
| Audit/SIEM integration | Azure-native | Azure-native | API-first | Self-hosted stack |
| Cost (30 users/yr) | ~A$3,300 | ~A$5,000 | ~A$6,500 | Infra only |
| Operational overhead | Low | Low | Low | High |
Go with Entra ID P1 if… you are Microsoft-first (M365, Teams, Azure VMs) and want the lowest friction. Upgrade to P2 only when you handle sensitive financial data or your cyber insurer mandates risk-based conditional access and Identity Protection.
Go with Okta if… you run a multi-cloud or best-of-breed SaaS stack and prefer one policy pane across disparate apps. Accept the premium as an integration-insurance policy.
Go with Authentik if… you are cost-constrained, run Kubernetes or Docker in-house, and your application list is short and static. Treat it as infrastructure, not a SaaS checkbox. If you cannot patch Postgres and reverse-proxy components within 48 hours of a CVE disclosure, do not self-host your identity provider.
FAQ
What is device code phishing and should my SMB worry? Device code phishing hijacks a legitimate OAuth flow by tricking users into authenticating an attacker-controlled session. The April 2026 Microsoft campaign used AI-generated lures tailored to finance roles. If your identity platform cannot detect anomalous token requests or risky sign-in behaviour, MFA alone will not save you.
Is Authentik secure enough for Australian financial or legal compliance? Authentik’s code is open and auditable, but meeting frameworks like SOC 2 or the Essential Eight depends entirely on your ability to harden the host, patch promptly, and retain tamper-proof logs. For most SMBs without a dedicated security engineer, managed SaaS reduces liability.
When do I need Entra ID P2 over P1? Upgrade when you have privileged accounts accessing critical systems, face regulatory requirements for risk-based policies, or your cyber insurance policy explicitly requires Identity Protection and automated access reviews.
Do I need a SIEM for these identity logs? Not strictly at 10-50 users, but centralising logs is ACSC Essential Eight hygiene. Entra ID and Okta both offer built-in dashboards sufficient for triage. Authentik requires at least a self-hosted logging stack to meet the same standard.
Conclusion
OAuth supply-chain attacks and AI-augmented phishing have moved identity architecture from "set and forget" to active defence. Choose the platform that aligns with your existing cloud footprint, enforce conditional access beyond simple password federation, and automate JML workflows before headcount scaling makes manual cleanup impossible. If you are unsure which path fits your risk profile and budget, visit consult.lil.business for a free cybersecurity assessment tailored to Australian SMBs.
References
- Microsoft Security: Inside an AI-enabled device code phishing campaign
- Trend Micro: The Vercel Breach — OAuth Supply Chain Attack
- Australian Cyber Security Centre: Essential Eight
Work With Us
Ready to strengthen your security posture?
lilMONSTER assesses your risks, builds the tools, and stays with you after the engagement ends. No clipboard-and-leave consulting.
Book a Free Consultation →TL;DR
- Bad guys are pretending to be "Signal Support" or "WhatsApp Help" to steal accounts
- They trick people into sharing secret codes or clicking dangerous links
- Once they have your account, they can read your messages and pretend to be you
- Thousands of people have already been tricked
- Never share your PIN or verification code with anyone, no matter what they say
What's Happening?
Imagine someone knocks on your door and says, "Hi, I'm from the phone company. I need to check your phone. Can you give me your keys?"
You wouldn't do it, right? Because a real phone company would never ask for your keys.
But the same trick is happening on messaging apps like Signal and WhatsApp — and lots of people are falling for it.
The Fake Support Trick
Bad guys are sending messages that look like they're from Signal or WhatsApp support. They say things like:
- "Your account will be deleted unless you verify now"
- "We detected suspicious activity. Click this link to fix it"
- "Scan this QR code to confirm your identity"
- "Please share your PIN to protect your account"
These messages are lies. They're not from Signal or WhatsApp. They're from hackers who want to steal your account.
How They Trick You
Trick 1: "Give Me Your Secret Code"
When you set up Signal or WhatsApp, you create a PIN or get a verification code. Think of this like the key to your house.
The hackers say: "To keep your account safe, tell us your PIN or verification code."
If you share it:
- They use your code to take over your account
- You get locked out
- They can read all your new messages
- They can send messages pretending to be you
Trick 2: "Click This Link"
The hackers send a link that looks real. They say: "Click here to fix your account."
If you click:
- It connects their device to your account
- Now both you AND the hacker are using your account
- They can read all your messages — even old ones
- They can see all your contacts
- They can pretend to be you with everything you've ever said
Why This Is Scary
Once someone has your account, they can:
- Read your messages: See what you're saying to friends, family, coworkers
- Pretend to be you: Send messages that look like they're from you
- Trick your friends: Use your account to scam the people you know
- Steal information: Get passwords, photos, documents you've shared
Imagine someone sending a message to your boss asking for money — and it looks like it came from you. That's what these hackers do.
The Sneaky Part: They Don't Break the Lock
Here's what makes this clever: Signal and WhatsApp have strong security (encryption). Your messages are protected.
But the hackers don't try to break that protection. Instead, they trick you into giving them the key.
It's like having a really strong lock on your door — but someone tricks you into opening it yourself.
Who's Being Targeted?
The hackers are especially interested in:
- Government workers
- Military personnel
- Reporters and journalists
- Business executives
- People with important jobs
But regular people get caught in the trap too. If your parent, friend, or colleague uses these apps for work, they might be targeted.
What You Can Do
Never Share These Things (Ever!)
- Your PIN
- Your verification code
- The six-digit code you get when setting up the app
- Any code sent to your phone or email
Real support will never ask for these. Ever.
Check for Strangers
If you use Signal:
- Open the app
- Go to Settings
- Tap Linked Devices
- If you see a device you don't recognize, remove it
If you use WhatsApp:
- Open the app
- Go to Settings
- Tap Linked Devices
- Remove any device you don't know
If Something Seems Wrong...
- Don't click anything
- Don't share any codes
- Contact the person directly through another way (call them, email them)
- Tell an adult or your IT person at work
Talk to Your Family and Friends
Lots of people don't know about this scam. Tell them:
- "Signal and WhatsApp will never ask for your PIN"
- "If someone says your account will be deleted, it's a lie"
- "Never share verification codes, no matter what the message says"
What If You Already Clicked?
If you think you might have shared your code or clicked a bad link:
- Unlink all devices from your account (in Settings)
- Tell someone — a parent, teacher, or your IT person at work
- Check your messages — see if anything strange was sent
- Warn your contacts — let people know your account was compromised
The Big Lesson
This scam teaches us something important:
Not everyone is who they say they are online.
Just because a message says it's from "Signal Support" doesn't mean it really is. Hackers are good at pretending.
The good news: You're in control. By never sharing your secret codes and checking for strange devices, you can keep your account safe.
FAQ
Yes! They have strong security. The problem isn't the apps — it's people tricking you into giving away access. Keep using them, just be smart about it.
Real support will never ask for your PIN, verification code, or password. Never. If a message asks for these, it's fake.
Only if you clicked a link or scanned a QR code that connected their device to your account. If you only shared your PIN, they can see new messages but not old ones.
They want to spy on people, steal information, and pretend to be others to scam more people. It's like identity theft, but for messaging apps.
Tell them: "Never share your PIN or verification codes, even if the message says it's urgent. Real support never asks for this."
References
[1] U.S. Cybersecurity and Infrastructure Security Agency (CISA), "Russian Intelligence Services Target Messaging Applications," CISA Alert, Mar. 2026. [Online]. Available: https://www.cisa.gov/resources-tools/resources/russian-intelligence-services-target-commercial-messaging-application-accounts
[2] FBI, "Phishing Attacks Targeting Signal and WhatsApp," FBI Alert, Mar. 2026. [Online]. Available: https://www.ic3.gov/PSA/2026/PSA260320
[3] The Hacker News, "FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks," The Hacker News, Mar. 2026. [Online]. Available: https://thehackernews.com/2026/03/fbi-warns-russian-hackers-target-signal.html
[4] French National Cybersecurity Agency (ANSSI), "Alert: Targeted Phishing Against Messaging Applications," CERT-FR, Mar. 2026. [Online]. Available: https://www.cert.ssi.gouv.fr/alerte/CERTFR-2026-ALE-003/
[5] Signal Support, "Security Best Practices," Signal.org, 2026. [Online]. Available: https://signal.org/learn/security/
Want to keep your family and business safe online? lilMONSTER helps people understand cybersecurity and protect what matters. Start here →