FraudHIGH

EvilTokens - New Phishing Kit Targets Microsoft Accounts

Featured image for EvilTokens - New Phishing Kit Targets Microsoft Accounts
BCBleepingComputer
EvilTokensMicrosoftPhaaSPhishingBusiness Email Compromise
🎯

Basically, EvilTokens tricks people into giving hackers access to their Microsoft accounts.

Quick Summary

EvilTokens, a new phishing kit, is targeting Microsoft accounts through device code phishing. This poses a high risk for businesses and users. Stay alert and protect your accounts from these sophisticated attacks.

What Happened

A new malicious kit called EvilTokens has emerged, integrating device code phishing capabilities. This kit allows attackers to hijack Microsoft accounts and is marketed to cybercriminals via Telegram. The creator of EvilTokens has plans to expand its functionality to include phishing for Gmail and Okta accounts in the future.

Device code phishing exploits the OAuth 2.0 device authorization flow. Attackers deceive victims into authorizing a malicious device, granting them access to sensitive accounts. This technique has been utilized by various threat actors, including groups linked to Russian cybercrime.

Who's Being Targeted

Researchers from Sekoia have identified that EvilTokens targets individuals through emails containing documents that appear legitimate. These documents often include QR codes or hyperlinks leading to phishing templates. The impersonated content can range from financial documents to meeting invitations, specifically aimed at employees in finance, HR, logistics, or sales roles.

Victims who fall for these lures are redirected to phishing pages that mimic trusted services, such as Adobe Acrobat or DocuSign. This deception is designed to extract sensitive information from unsuspecting users.

Signs of Infection

Once a victim interacts with the phishing link, they are prompted to authenticate through a legitimate Microsoft URL. At this point, attackers use a legitimate Microsoft application to request a device code. Victims unknowingly provide both a short-lived access token and a refresh token to the attackers.

These tokens grant immediate access to the victim's Microsoft services, including email and Teams data. The global reach of EvilTokens has been noted, with significant activity reported in countries like the United States, Canada, and Australia.

How to Protect Yourself

To mitigate the risks posed by EvilTokens, users should remain vigilant against suspicious emails and verify the authenticity of any links before clicking. Organizations should educate employees about the dangers of phishing and implement multi-factor authentication to add an extra layer of security.

Sekoia has provided indicators of compromise (IoCs) and technical details to help defenders block EvilTokens-related attacks. Staying informed and proactive is essential to safeguarding against these evolving threats.

🔒 Pro insight: The emergence of EvilTokens highlights the growing sophistication of phishing-as-a-service operations, necessitating enhanced user awareness and security measures.

Original article from

BCBleepingComputer· Bill Toulas
Read Full Article

Related Pings

HIGHFraud

Customer Authentication - Why Are They Sending Money to Scammers?

Fraud expert Lenny Gusel reveals how separating identity management from fraud detection increases risks. Customers can still be scammed even after authentication. Integrating these systems is crucial for security.

Help Net Security·
HIGHFraud

Digital Assets After Death - Managing Fraud Risks Explained

Fraudsters are targeting deceased individuals' digital accounts. Families must learn how to safeguard digital assets and prevent scams during this vulnerable time. Planning ahead can protect loved ones.

WeLiveSecurity (ESET)·
HIGHFraud

Bitcoin Hidden in Fishing Rod - Ajax FC Data Breach Exposed

An Irishman lost $400 million in Bitcoin due to a missing fishing rod. Meanwhile, Ajax FC's data breach exposed 300,000 fans' personal details, risking their security.

Smashing Security·
HIGHFraud

Payment Fraud - Industrialization Creates New Detection Opportunities

What Happened Payment fraud has undergone a significant transformation, evolving from isolated schemes into a sophisticated industrial ecosystem. This shift is characterized by the emergence of purpose-built infrastructure, toolkits, and professional services that allow fraudsters to maximize their output with minimal effort. The Annual Payment Fraud Intelligence Report: 2025 highlights how this industrialization has been fueled by technical advancements

Recorded Future Blog·
HIGHFraud

Bogus LinkedIn Message - Credential Siphoning Alert

A new phishing campaign is targeting LinkedIn users with fake job alerts. Scammers are tricking victims into revealing their credentials. Stay alert and verify messages to protect your information.

SC Media·
HIGHFraud

Cambodia Extradites Li Xiong - Key Cyber Scam Figure

Li Xiong, a major figure in cyber scams, has been extradited to China. His group, Huione, allegedly laundered billions. This highlights the global effort to combat cyber fraud.

The Record·