Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
EvilTokens: A New Phishing Threat Targeting Microsoft Accounts

EvilTokens: A New Phishing Threat Targeting Microsoft Accounts

Posted on March 31, 2026 By CWS

A newly developed phishing toolkit has surfaced, raising concerns in the cybersecurity community. In early 2026, EvilTokens, a Phishing-as-a-Service (PhaaS) platform, began making waves in cybercriminal circles by offering an advanced kit designed to compromise Microsoft 365 accounts.

Unlike typical phishing tools that replicate Microsoft login interfaces, EvilTokens employs a different tactic by exploiting the genuine Microsoft device code authentication flow, covertly granting attackers complete account access.

Emergence and Adoption of EvilTokens

Introduced to the cybercrime landscape in February 2026, EvilTokens quickly gained traction among cybercriminals specializing in Business Email Compromise (BEC) and Adversary-in-the-Middle (AitM) attacks.

The platform operates using Telegram bots and provides its affiliates with phishing templates, tools for email collection, account exploration capabilities, a built-in webmail interface, and AI-driven automation. The creator, known as eviltokensadmin, has announced plans to extend support to Gmail and Okta phishing pages soon.

Research and Implications

Sekoia’s Threat Detection and Research (TDR) team identified EvilTokens in March 2026 while observing phishing-focused cybercrime forums. Their analysis confirmed that EvilTokens is the first PhaaS offering ready-to-use Microsoft device code phishing pages, likely generated using AI technology.

Attacks attributed to EvilTokens have impacted organizations across the globe, notably in the United States, Australia, Canada, France, India, Switzerland, and the United Arab Emirates. The attacks typically target employees in finance, HR, logistics, and sales, roles particularly susceptible to BEC scams.

Mechanics of Account Compromise

The core strategy of EvilTokens revolves around manipulating Microsoft’s OAuth 2.0 Device Authorization Grant, a legitimate protocol intended for devices with limited input options, such as smart TVs.

In a typical scenario, a device shows a code to be entered in a browser for authentication. EvilTokens hijacks this process by posing as the device and deceiving victims into completing the authentication on the attacker’s behalf.

When victims input the code, believing they are accessing shared documents or invoices, they inadvertently provide attackers with an access token and a refresh token, facilitating prolonged account access.

To counter such threats, organizations should disable device code authentication flows for unnecessary users through Conditional Access policies in Microsoft Entra ID. Security teams are advised to monitor sign-ins using this grant type, particularly from unknown locations.

Employee education on device authentication is critical, as the attack succeeds when victims misunderstand the implications of entering a device code. Sekoia has released a YARA rule to detect EvilTokens phishing pages, and tools like urlscan.io and urlquery can help identify associated infrastructure.

Cyber Security News Tags:AI-generated, AiTM, BEC, cyber threat, Cybercrime, Cybersecurity, device code, email compromise, EvilTokens, Microsoft, OAuth 2.0, PhaaS, Phishing, Security, Sekoia

Post navigation

Previous Post: Censys Secures $70M to Boost Internet Intelligence
Next Post: Exploitation of TrueConf Flaw Targets Southeast Asian Governments

Related Posts

Threat Actors Weaponizes LNK Files to Deploy RedLoader Malware on Windows Systems Threat Actors Weaponizes LNK Files to Deploy RedLoader Malware on Windows Systems Cyber Security News
GoBruteforcer Botnet Attacking Linux Servers Worldwide GoBruteforcer Botnet Attacking Linux Servers Worldwide Cyber Security News
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials Cyber Security News
Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files Cyber Security News
Exploit Targets Windows Snipping Tool Vulnerability Exploit Targets Windows Snipping Tool Vulnerability Cyber Security News
New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Grafana Labs GitHub Breach: Codebase Compromised by Hackers
  • Grafana Suffers GitHub Token Breach, Faces Extortion
  • Public macOS Kernel Exploit Found on Apple M5 Chip
  • Critical Flaw in Funnel Builder Targets WooCommerce
  • JDownloader Site Incident: Malicious Installers Found

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Grafana Labs GitHub Breach: Codebase Compromised by Hackers
  • Grafana Suffers GitHub Token Breach, Faces Extortion
  • Public macOS Kernel Exploit Found on Apple M5 Chip
  • Critical Flaw in Funnel Builder Targets WooCommerce
  • JDownloader Site Incident: Malicious Installers Found

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark