FraudHIGH

EvilTokens - Rampant Device Code Phishing Targets Microsoft 365

Featured image for EvilTokens - Rampant Device Code Phishing Targets Microsoft 365
HNHelp Net Security
EvilTokensMicrosoft 365phishingdevice code phishingBEC scams
🎯

Basically, EvilTokens tricks Microsoft 365 users into giving away their login access through fake login prompts.

Quick Summary

A rise in device code phishing attacks is targeting Microsoft 365 users, fueled by the EvilTokens toolkit. This sophisticated method tricks users into revealing their access tokens, leading to account compromises. Organizations must take action to protect their sensitive data from these growing threats.

What Happened

Security researchers have observed a significant rise in device code phishing activities aimed at Microsoft 365 users. This increase has been linked to EvilTokens, a new phishing toolkit that is being marketed as a service on Telegram. Device code phishing is a method where attackers exploit legitimate authentication flows to trick users into logging into their accounts, ultimately stealing their access and refresh tokens.

The device code authentication workflow, originally designed for input-constrained devices, is being misused by phishers. They initiate a genuine device authorization request and send the login code to the targeted user. If the user follows the link and enters the code, they unknowingly hand over their access tokens to the attacker.

Who's Affected

The primary targets of these phishing campaigns are Microsoft 365 users, particularly employees in sensitive sectors such as finance, human resources, and logistics. As more organizations adopt cloud services, the risk of such targeted attacks increases. The EvilTokens toolkit lowers the barrier for entry, allowing even low-skill attackers to launch sophisticated phishing operations.

Organizations must remain vigilant as these attacks can lead to unauthorized access to sensitive data and systems. The potential for lateral movement within an organization’s network makes this threat particularly concerning, as attackers can exploit compromised accounts to access further resources.

What Data Was Exposed

When successful, device code phishing can lead to the exposure of critical data. Attackers gain access to valid access and refresh tokens, enabling them to authenticate as the victim without needing their login credentials. This access allows attackers to move laterally within the organization, potentially compromising financial records or sensitive communications.

The EvilTokens toolkit provides templates for various phishing scenarios, including email quarantine notices and document sharing requests. This diversity in phishing tactics increases the likelihood of success, as attackers can tailor their approach based on the victim’s role and the context of their work.

What You Should Do

Organizations should take proactive measures to defend against device code phishing. Training employees to recognize phishing attempts and understand the legitimate device authorization process is crucial. Implementing Conditional Access policies can help restrict device code authentication to approved users and devices.

Monitoring for anomalous sign-ins and revoking refresh tokens when compromise is suspected are also essential steps. By staying informed and prepared, organizations can mitigate the risks associated with this evolving threat landscape.

🔒 Pro insight: The emergence of EvilTokens signifies a shift in phishing tactics, necessitating enhanced user education and robust access controls to combat this threat.

Original article from

HNHelp Net Security· Zeljka Zorz
Read Full Article

Related Pings

HIGHFraud

Hacker Stripped $50 Million from Uranium Crypto Exchange

A Maryland man has been charged with hacking Uranium Finance, stealing over $50 million. His actions exploited vulnerabilities in smart contracts, leading to significant losses for users. This case highlights the urgent need for improved security in cryptocurrency exchanges.

Help Net Security·
HIGHFraud

EvilTokens - New Phishing-as-a-Service Targets Microsoft Accounts

A new phishing toolkit, EvilTokens, has surfaced, targeting Microsoft 365 accounts. This platform poses significant risks to organizations globally, enabling easy account takeovers. Cybercriminals are exploiting it to conduct Business Email Compromise attacks, making awareness and prevention crucial.

Cyber Security News·
HIGHFraud

Hacker Charged - $53 Million Stolen from Uranium Crypto Exchange

A Maryland man has been charged with stealing over $53 million from Uranium Finance. His actions led to the exchange's shutdown, affecting numerous investors. This case highlights the risks in cryptocurrency security.

BleepingComputer·
HIGHFraud

Phantom Stealer - Credential Theft Campaigns Blocked

Phantom Stealer is a phishing service targeting businesses through deceptive emails. Group-IB's protection measures successfully blocked these attacks, safeguarding email credentials. Stay informed and protect your organization from these threats.

Group-IB Blog·
HIGHFraud

Tax Season Phishing - Cybercriminals Unleash New Tactics

Cybercriminals are ramping up phishing attacks during tax season. These scams threaten sensitive personal and financial data. Awareness and education are vital to combat these threats effectively.

Infosecurity Magazine·
HIGHFraud

North Korean Operative Uses Stolen Identity in Job Scam

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and a fake AI resume. This highlights a serious threat to organizations worldwide. Companies must be vigilant against such sophisticated scams to protect their data and reputation.

Cyber Security News·