Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
EvilTokens and AMOS: Major Phishing Threats of March 2026

EvilTokens and AMOS: Major Phishing Threats of March 2026

Posted on April 8, 2026 By CWS

In March 2026, two significant phishing campaigns, EvilTokens and AMOS, emerged, posing a substantial threat to enterprises and macOS users. These campaigns exploit advanced techniques, with EvilTokens targeting enterprise accounts via Microsoft’s OAuth authentication, while AMOS focuses on macOS users engaged in AI development.

EvilTokens Campaign: Bypassing Traditional Protections

The EvilTokens campaign marks a shift in phishing strategies by circumventing the need for password theft. Attackers exploit Microsoft’s OAuth 2.0 Device Code flow, originally intended for devices with limited input capabilities, to gain unauthorized access to enterprise accounts. This method leverages legitimate Microsoft infrastructure to deceive users into granting access.

Victims receive phishing emails directing them to enter a device code at Microsoft’s legitimate site, leading to attackers obtaining OAuth tokens despite multi-factor authentication (MFA). This technique renders traditional phishing detection ineffective as credentials are never entered on fake sites.

EvilTokens operates as a Phishing-as-a-Service (PhaaS) platform, facilitating widespread attacks across various sectors in the United States and India. With over 180 phishing URLs detected in a week, the campaign’s automation and AI capabilities enable rapid execution and significant impact.

AMOS Campaign: Targeting macOS Developers

Simultaneously, the AMOS campaign targets macOS users, particularly developers using AI tools. Attackers deploy a ClickFix attack chain, misleading users through Google Ads to run malicious terminal commands from fake documentation pages. This sophisticated social engineering tactic leads to the execution of an encoded script, resulting in credential theft.

The AMOS Stealer extracts browser credentials, saved passwords, and macOS Keychain contents, establishing a persistent backdoor with full system access. This poses a grave risk to enterprises as developers often manage sensitive data and infrastructure.

The evolution of the backdoor module, previously limited, now supports an interactive reverse shell, granting attackers extended access. This highlights the increasing complexity and danger of such attacks.

Mitigation and Future Outlook

Organizations must enhance their security measures to counter these threats. For EvilTokens, auditing Microsoft Entra ID logs for unusual device code flows and implementing Conditional Access policies is crucial. Regular token rotation for privileged accounts can also mitigate risks.

For the AMOS threat, policies to block unsigned script execution and monitoring for suspicious WebSocket connections are essential. Deploying endpoint detection systems tuned to identify AMOS behaviors can prevent further infiltration.

These campaigns underscore a broader trend where attackers harness legitimate infrastructure and workflows, such as Microsoft pages and Google Ads, to evade detection. Strengthening cross-platform threat visibility is imperative for reducing breach risks and ensuring rapid response to emerging threats.

Cyber Security News Tags:AI tools, AMOS, ClickFix, Cybersecurity, EvilTokens, macOS, Microsoft, OAuth, PhaaS, Phishing

Post navigation

Previous Post: OpenSSL Updates Fix Critical Data Leak Flaw
Next Post: Masjesu Botnet Threatens IoT Devices with DDoS Attacks

Related Posts

HPE OneView Software Vulnerability Let Attackers Execute Remote Code HPE OneView Software Vulnerability Let Attackers Execute Remote Code Cyber Security News
Adobe’s August 2025 Patch Tuesday Adobe’s August 2025 Patch Tuesday Cyber Security News
Beware of Weaponized Employee Performance Reports that Deploys Guloader Malware Beware of Weaponized Employee Performance Reports that Deploys Guloader Malware Cyber Security News
Major Security Breach at Loblaw: Customer Data Compromised Major Security Breach at Loblaw: Customer Data Compromised Cyber Security News
New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials New Lampion Stealer Uses ClickFix Attack to Silently Steal Login Credentials Cyber Security News
BlueHammer Exploit Affects Windows Defender Security BlueHammer Exploit Affects Windows Defender Security Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft 365 Network Outage Affects Key Services
  • Chaos Malware Variant Exploits Cloud Vulnerabilities
  • Zero-Day Exploit Threatens Adobe Reader Users
  • US Halts Russian Espionage Using Hacked Routers and DNS Tricks
  • Masjesu Botnet: Global Threat to IoT Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft 365 Network Outage Affects Key Services
  • Chaos Malware Variant Exploits Cloud Vulnerabilities
  • Zero-Day Exploit Threatens Adobe Reader Users
  • US Halts Russian Espionage Using Hacked Routers and DNS Tricks
  • Masjesu Botnet: Global Threat to IoT Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark