Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
EvilTokens and AMOS: Major Phishing Threats of March 2026

EvilTokens and AMOS: Major Phishing Threats of March 2026

Posted on April 8, 2026 By CWS

In March 2026, two significant phishing campaigns, EvilTokens and AMOS, emerged, posing a substantial threat to enterprises and macOS users. These campaigns exploit advanced techniques, with EvilTokens targeting enterprise accounts via Microsoft’s OAuth authentication, while AMOS focuses on macOS users engaged in AI development.

EvilTokens Campaign: Bypassing Traditional Protections

The EvilTokens campaign marks a shift in phishing strategies by circumventing the need for password theft. Attackers exploit Microsoft’s OAuth 2.0 Device Code flow, originally intended for devices with limited input capabilities, to gain unauthorized access to enterprise accounts. This method leverages legitimate Microsoft infrastructure to deceive users into granting access.

Victims receive phishing emails directing them to enter a device code at Microsoft’s legitimate site, leading to attackers obtaining OAuth tokens despite multi-factor authentication (MFA). This technique renders traditional phishing detection ineffective as credentials are never entered on fake sites.

EvilTokens operates as a Phishing-as-a-Service (PhaaS) platform, facilitating widespread attacks across various sectors in the United States and India. With over 180 phishing URLs detected in a week, the campaign’s automation and AI capabilities enable rapid execution and significant impact.

AMOS Campaign: Targeting macOS Developers

Simultaneously, the AMOS campaign targets macOS users, particularly developers using AI tools. Attackers deploy a ClickFix attack chain, misleading users through Google Ads to run malicious terminal commands from fake documentation pages. This sophisticated social engineering tactic leads to the execution of an encoded script, resulting in credential theft.

The AMOS Stealer extracts browser credentials, saved passwords, and macOS Keychain contents, establishing a persistent backdoor with full system access. This poses a grave risk to enterprises as developers often manage sensitive data and infrastructure.

The evolution of the backdoor module, previously limited, now supports an interactive reverse shell, granting attackers extended access. This highlights the increasing complexity and danger of such attacks.

Mitigation and Future Outlook

Organizations must enhance their security measures to counter these threats. For EvilTokens, auditing Microsoft Entra ID logs for unusual device code flows and implementing Conditional Access policies is crucial. Regular token rotation for privileged accounts can also mitigate risks.

For the AMOS threat, policies to block unsigned script execution and monitoring for suspicious WebSocket connections are essential. Deploying endpoint detection systems tuned to identify AMOS behaviors can prevent further infiltration.

These campaigns underscore a broader trend where attackers harness legitimate infrastructure and workflows, such as Microsoft pages and Google Ads, to evade detection. Strengthening cross-platform threat visibility is imperative for reducing breach risks and ensuring rapid response to emerging threats.

Cyber Security News Tags:AI tools, AMOS, ClickFix, Cybersecurity, EvilTokens, macOS, Microsoft, OAuth, PhaaS, Phishing

Post navigation

Previous Post: OpenSSL Updates Fix Critical Data Leak Flaw
Next Post: Masjesu Botnet Threatens IoT Devices with DDoS Attacks

Related Posts

JDownloader Site Incident: Malicious Installers Found JDownloader Site Incident: Malicious Installers Found Cyber Security News
Beware of Fake AI Business Tools That Hides Ransomware Beware of Fake AI Business Tools That Hides Ransomware Cyber Security News
OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes Cyber Security News
Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware Cyber Security News
Tenda N300 Vulnerabilities Let Attacker to Execute Arbitrary Commands as Root User Tenda N300 Vulnerabilities Let Attacker to Execute Arbitrary Commands as Root User Cyber Security News
ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Malware Sandbox Tools Enhancing Security in 2026
  • Advanced Tool Detects Persistence Malware on Multiple OS
  • Packagist Supply Chain Breach Targets Eight Packages
  • npm Enhances Security with 2FA and Install Controls
  • AI Model Uncovers 10,000 Critical Software Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Malware Sandbox Tools Enhancing Security in 2026
  • Advanced Tool Detects Persistence Malware on Multiple OS
  • Packagist Supply Chain Breach Targets Eight Packages
  • npm Enhances Security with 2FA and Install Controls
  • AI Model Uncovers 10,000 Critical Software Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark