FraudHIGH

EvilTokens - New Phishing-as-a-Service Targets Microsoft Accounts

Featured image for EvilTokens - New Phishing-as-a-Service Targets Microsoft Accounts
CSCyber Security News
EvilTokensMicrosoft 365phishingBusiness Email CompromiseAdversary-in-the-Middle
🎯

Basically, EvilTokens is a new tool that helps criminals steal Microsoft accounts easily.

Quick Summary

A new phishing toolkit, EvilTokens, has surfaced, targeting Microsoft 365 accounts. This platform poses significant risks to organizations globally, enabling easy account takeovers. Cybercriminals are exploiting it to conduct Business Email Compromise attacks, making awareness and prevention crucial.

What Happened

In early 2026, a new Phishing-as-a-Service platform named EvilTokens emerged in underground cybercrime communities. This toolkit is specifically designed to target Microsoft 365 accounts, offering criminals a ready-to-use kit for account theft. Unlike traditional phishing tools that replicate Microsoft login pages, EvilTokens exploits the legitimate Microsoft device code authentication flow. This innovative approach allows attackers to gain full access to victims' accounts without raising immediate suspicion.

EvilTokens first appeared in mid-February 2026 and quickly gained traction among cybercriminals engaged in Business Email Compromise (BEC) and Adversary-in-the-Middle (AitM) attacks. The platform operates via Telegram bots and provides affiliates with various tools, including phishing page templates and email harvesting capabilities. The operator, known as eviltokensadmin, plans to expand the service to include phishing pages for Gmail and Okta in the near future.

Who's Affected

The reach of EvilTokens is extensive, impacting organizations across North America, South America, Europe, the Middle East, Asia, and Oceania. Countries like the United States, Australia, Canada, France, India, Switzerland, and the United Arab Emirates have reported significant incidents linked to this platform. The most targeted sectors include finance, HR, logistics, and sales, where employees are particularly vulnerable to BEC fraud.

By March 23, 2026, researchers identified over 1,000 domains associated with EvilTokens phishing pages. These pages utilized various lures, such as fake financial reports and shared documents from services like DocuSign, OneDrive, and SharePoint. The sheer volume of attacks indicates a well-coordinated effort by cybercriminals to exploit unsuspecting users.

How It Works

EvilTokens operates by hijacking the OAuth 2.0 Device Authorization Grant process, which is typically used for devices with limited input capabilities. In a standard scenario, a device generates a short code that users enter on a separate browser to authenticate. However, EvilTokens manipulates this flow by posing as the authenticating device, tricking victims into completing the sign-in on the attacker's behalf.

The attack begins when an attacker requests a device code from Microsoft's API. This code is then presented to the victim through a phishing page, leading them to believe they are simply verifying access to a shared document. Once the victim enters the code, the attacker receives valid access and refresh tokens, granting them immediate and lasting access to the account. The refresh token, lasting up to 90 days, allows attackers to maintain access without needing to re-authenticate.

What You Should Do

Organizations are advised to take proactive measures to protect against EvilTokens. Disabling device code authentication flows for users who do not require them is a crucial step. This can be achieved using Conditional Access policies in Microsoft Entra ID. Additionally, security teams should closely monitor sign-ins using the device code grant type, especially from unfamiliar locations.

Employee training on device authentication is vital, as the success of this attack relies heavily on victims' lack of awareness about what entering a device code authorizes. Implementing detection rules, such as the YARA rule released by Sekoia, can help identify EvilTokens phishing pages. Regularly querying resources like urlscan.io and urlquery with known EvilTokens URL patterns can aid in uncovering related infrastructure. By staying vigilant and informed, organizations can better defend against this emerging threat.

🔒 Pro insight: EvilTokens represents a significant evolution in phishing tactics, leveraging legitimate authentication flows to bypass traditional security measures.

Original article from

CSCyber Security News· Tushar Subhra Dutta
Read Full Article

Related Pings

HIGHFraud

Hacker Charged - $53 Million Stolen from Uranium Crypto Exchange

A Maryland man has been charged with stealing over $53 million from Uranium Finance. His actions led to the exchange's shutdown, affecting numerous investors. This case highlights the risks in cryptocurrency security.

BleepingComputer·
HIGHFraud

Phantom Stealer - Credential Theft Campaigns Blocked

Phantom Stealer is a phishing service targeting businesses through deceptive emails. Group-IB's protection measures successfully blocked these attacks, safeguarding email credentials. Stay informed and protect your organization from these threats.

Group-IB Blog·
HIGHFraud

Tax Season Phishing - Cybercriminals Unleash New Tactics

Cybercriminals are ramping up phishing attacks during tax season. These scams threaten sensitive personal and financial data. Awareness and education are vital to combat these threats effectively.

Infosecurity Magazine·
HIGHFraud

North Korean Operative Uses Stolen Identity in Job Scam

A North Korean operative attempted to infiltrate a cybersecurity firm using a stolen identity and a fake AI resume. This highlights a serious threat to organizations worldwide. Companies must be vigilant against such sophisticated scams to protect their data and reputation.

Cyber Security News·
HIGHFraud

Homoglyph Attack Techniques - Cybercriminals Spoof Domains

Cybercriminals are using homoglyph attacks to spoof trusted domains. This clever trick can mislead users into visiting fake websites. Organizations must enhance security measures to combat these deceptive tactics.

Cyber Security News·
HIGHFraud

Russian Court Sentences Flint24 Card Fraud Ringleader

What Happened A Russian military court has sentenced 26 members of the notorious cybercrime group Flint24, including its leader, Alexei Stroganov, also known as Flint. The group was convicted for their roles in a large-scale operation that trafficked stolen payment card data. Each member received prison sentences of up to 15 years and fines totaling $57,000. This crackdown comes

The Record·