Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FBI Alerts on New Phishing Platform Targeting Microsoft 365

FBI Alerts on New Phishing Platform Targeting Microsoft 365

Posted on May 22, 2026 By CWS

The Federal Bureau of Investigation (FBI) has released a critical warning concerning a new phishing-as-a-service platform named Kali365. This emerging threat specifically targets Microsoft 365 users by stealing access tokens and circumventing multi-factor authentication (MFA) mechanisms.

Kali365’s Distribution and Capabilities

Primarily disseminated via Telegram channels, Kali365 allows cybercriminals to subscribe and launch phishing attacks with little technical expertise required. Unlike traditional credential-stealing methods, Kali365 is designed to capture OAuth tokens, which grants attackers ongoing access to Microsoft 365 accounts without needing usernames, passwords, or MFA codes.

The platform is equipped with several user-friendly features, such as AI-generated phishing email templates that mimic trusted services, tools for automated campaign deployment, real-time dashboards for tracking victims, and mechanisms for capturing OAuth tokens. These features enable even less experienced attackers to conduct large-scale, sophisticated phishing operations.

How Kali365 Exploits Microsoft 365

Kali365 cleverly utilizes Microsoft’s device code authentication process to deceive users into granting malicious access. Victims are lured by phishing emails that seem to originate from Microsoft or document-sharing platforms. These emails provide a device code with instructions for verification.

When users enter the code on a legitimate Microsoft verification page, they inadvertently authorize the attacker’s session, allowing the capture of both OAuth access and refresh tokens. This method grants attackers access to services like Outlook, Teams, and OneDrive, bypassing MFA and remaining undetected.

FBI and CISA’s Mitigation Strategies

The FBI, in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), advises several preventive measures to minimize exposure to Kali365. These include disabling device code flow authentication when possible, implementing conditional access policies to block unauthorized device code use, and auditing existing dependencies on device code flows before imposing restrictions.

Organizations are also advised to monitor for atypical sign-ins and token usage patterns. In the event of a Kali365-related attack, victims should report incidents to the FBI’s Internet Crime Complaint Center (IC3) with detailed information such as phishing email samples, suspicious login details, and unauthorized device activity.

As phishing tactics evolve, the rise of platforms like Kali365 underscores the shift towards token-based attacks that bypass traditional security measures, emphasizing the need for enhanced identity and access management.

Cyber Security News Tags:CISA, cyber threat, Cybersecurity, device code authentication, FBI warning, Kali365, Microsoft 365, multi-factor authentication, OAuth tokens, phishing attack

Post navigation

Previous Post: CISA Alerts: Exploited Vulnerability in Trend Micro Apex One
Next Post: Canadian Accused of Running Major DDoS Botnet

Related Posts

New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device Cyber Security News
WhatsApp Users Targeted by Spyware in Italy WhatsApp Users Targeted by Spyware in Italy Cyber Security News
Qilin Ransomware Leveraging Mspaint and Notepad to Find Files with Sensitive Information Qilin Ransomware Leveraging Mspaint and Notepad to Find Files with Sensitive Information Cyber Security News
“AI-Induced Destruction” – Helpful Tools Become Accidental Weapons “AI-Induced Destruction” – Helpful Tools Become Accidental Weapons Cyber Security News
Critical Windows Flaw Allows SYSTEM Level Access Critical Windows Flaw Allows SYSTEM Level Access Cyber Security News
North Korea Leverages Modular Malware to Evade Detection North Korea Leverages Modular Malware to Evade Detection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Megalodon Campaign Targets Thousands of GitHub Repositories
  • Hugging Face Exploited in North Korean Malware Attack
  • Canadian Accused of Running Major DDoS Botnet
  • FBI Alerts on New Phishing Platform Targeting Microsoft 365
  • CISA Alerts: Exploited Vulnerability in Trend Micro Apex One

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Megalodon Campaign Targets Thousands of GitHub Repositories
  • Hugging Face Exploited in North Korean Malware Attack
  • Canadian Accused of Running Major DDoS Botnet
  • FBI Alerts on New Phishing Platform Targeting Microsoft 365
  • CISA Alerts: Exploited Vulnerability in Trend Micro Apex One

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark