ThreatLocker
  • Home
  • News
  • Security
  • New EvilTokens service fuels Microsoft device code phishing attacks

New EvilTokens service fuels Microsoft device code phishing attacks

  • April 1, 2026
  • 03:42 PM
  • 3

New EvilTokens service fuels Microsoft device code phishing attacks

A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft accounts and provide advanced features for business email compromise attacks.

The kit is sold to cybercriminals over Telegram and is under continuous development, its author stating that they plan to extend support for Gmail and Okta phishing pages.

Device code phishing attacks abuse the OAuth 2.0 device authorization flow, in which attackers gain access to a victim account by tricking the owner into authorizing a malicious device.

The technique is well-documented and has been used by various threat actors, including Russian groups tracked as Storm-237, UTA032, UTA0355, UNK_AcademicFlare, and TA2723 [1, 2, 3], and the ShinyHunters data extortion group.

EvilTokens attacks

Researchers at threat detection and response company Sekoia observed EvilTokens attacks where the victims received emails with documents (PDF, HTML, DOCX, XLSX, or SVG) that contained either a QR code or a hyperlink to an EvilTokens phishing template.

These lures impersonate legitimate business content such as financial documents, meeting invitations, logistics or purchase orders, payroll notices, or shared documents via services like DocuSign or SharePoint, and are often tailored to employees in finance, HR, logistics, or sales roles.

Various phishing template offered by the platform
Various phishing templates in EvilTokens
Source: Sekoia

When the victim opens the link, they are presented with a phishing page that impersonates a trusted service (e.g., Adobe Acrobat or DocuSign), which displays a verification code and instructions to complete identity verification.

The page prompts the user to click a “Continue to Microsoft” button, redirecting them to the legitimate Microsoft device login page.

At this step, the attacker uses a legitimate client (any Microsoft application) to request a device code. Then, they trick the victim into authenticating to the legitimate Microsoft URL from the threat actor.

EvilTokens attack flow
EvilTokens attack flow
Source: Sekoia

This way, the attacker receives both a short-lived access token and a refresh token for persistent access.

These tokens give the attacker immediate access to the services associated with the victim account, including email, files, Teams data, and the capability to perform SSO impersonation across Microsoft services.

Sekoia researchers examined EvilTokens' infrastructure and uncovered campaigns with a global reach, the most affected countries being the United States, Canada, France, Australia, India, Switzerland, and the UAE.

Most targeted countries by EvilTokens operators
Most targeted countries by EvilTokens operators
Source: Sekoia

Apart from advanced phishing, Sekoia researchers say that the EvilTokens phishing-as-a-service (PhaaS) operation also provides "advanced features to conduct BEC [business email compromise] attacks" through automation.

The variety of the campaigns suggests that EvilTokens is already being used at scale by threat actors involved in phishing and business email compromise (BEC) activities.

Sekoia provides indicators of compromise (IoC), technical details, and YARA rules to help defenders block attacks leveraging the EvilTokens PhaaS kit.

article image

99% of What Mythos Found Is Still Unpatched.

AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.

Claim Your Spot

Related Articles:

Device code phishing attacks surge 37x as new kits spread online

New VENOM phishing attacks steal senior executives' Microsoft logins

Tycoon2FA phishing platform returns after recent police disruption

Europol-coordinated action disrupts Tycoon2FA phishing platform

New Bluekit phishing service includes an AI assistant, 40 templates

Bill Toulas
Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.

Comments

  • 2022computerissues Photo
    2022computerissues - 4 weeks ago

    This is a risk you take when you use a Microsoft account. Think about it - you sync all your data to your Microsoft account - now someone hacks your MS account. They use your compromised account to reset passwords, access your email, find sensitive information, or establish persistence on devices signed in on that MS account. From there, the sky is the limit. If you've enabled Remote Desktop or Quick Assist on your device, they could potentially use those features to access your computer remotely - the Windows Hello/PIN on the login screen doesn't block these remote access methods. They might be able to reset your Windows password through your MS account settings, which could allow them to create a new account or change authentication methods—potentially bypassing other Hello/PIN protections.

  • horsedoggs Photo
    horsedoggs - 4 weeks ago

    "This is a risk you take when you use a Microsoft account. Think about it - you sync all your data to your Microsoft account - now someone hacks your MS account. They use your compromised account to reset passwords, access your email, find sensitive information, or establish persistence on devices signed in on that MS account. From there, the sky is the limit. If you've enabled Remote Desktop or Quick Assist on your device, they could potentially use those features to access your computer remotely - the Windows Hello/PIN on the login screen doesn't block these remote access methods. They might be able to reset your Windows password through your MS account settings, which could allow them to create a new account or change authentication methods—potentially bypassing other Hello/PIN protections."

    Look up Microsoft intune device compliance, if this is used properly these types of attacks are useless, any good IT firm will have this in place, With out the company device attacker sign in will be rejected. Identify and device layering is key here.

  • 2022computerissues Photo
    2022computerissues - 4 weeks ago

    You are making assumptions - "any good IT firm will have this in place" and "these types of attacks are useless." In the real world this is far from the truth. Its the kind of thinking that leads to security gaps - "We have Intune, so we're fine"—when actually, you need Intune plus token monitoring, user training, email filtering, incident response, and so on. Many organizations big and small continue to fail to implement defenses properly, and are subject to human error/social engineering. If the attacker tricks an actual employee into authorizing the device (which is what this attack does) Or the attackers can and do often use an employees compromised device that is already trusted.

Post a Comment Community Rules
You need to login in order to post a comment

Not a member yet? Register Now

You may also like:

Login

Reporter

Help us understand the problem. What is going on with this comment?

Read our posting guidelinese to learn what content is prohibited.

SUBMIT