Widespread OAuth Device Code Phishing Campaign Targets Microsoft 365 via EvilTokens PhaaS
Summary
Hide ▲
Show ▼
Since mid-February 2026, a large-scale device code phishing campaign has targeted Microsoft 365 across at least 340 organizations in over 10 countries, escalating 37.5x in early April. The campaign abuses OAuth device authorization flows via the EvilTokens PhaaS platform and at least 10 additional phishing kits (VENOM, DOCUPOLL, SHAREFILE, etc.), granting persistent access tokens even after password resets. Attacks incorporate anti-bot evasion, multi-hop redirect chains via vendor services, and SaaS-themed lures, while mitigation focuses on disabling device code flows and monitoring anomalous authentications. Credential exposures like the Figure breach (967,200 email records) enable follow-on campaigns—credential stuffing, AI-generated phishing, and help desk social engineering—that bypass legacy MFA through real-time phishing relays and social engineering. Legacy MFA and even FIDO2 passkeys are structurally unable to prevent these attacks, which rely on human judgment at critical control points. Phishing-resistant authentication requires cryptographic origin binding, hardware-bound keys, and live biometric verification to close relay and delegation vectors.
Timeline
-
25.03.2026 13:34 4 articles · 16d ago
Device Code Phishing Campaign Leveraging EvilTokens PhaaS Hits 340+ Microsoft 365 Organizations
The scope and scale of device code phishing attacks have surged dramatically in early 2026, with a 37.5x increase in attacks detected compared to baseline levels at the start of March 2026. EvilTokens is identified as the most prominent phishing kit driving the mainstream adoption of this technique, enabling low-skilled cybercriminals to execute attacks that abuse Microsoft’s OAuth device authorization flow. At least 10 additional phishing kits (e.g., VENOM, DOCUPOLL, SHAREFILE, CLURE, LINKID, AUTHOV, FLOW_TOKEN, PAPRIKA, DCSTATUS) now offer device code phishing capabilities, each incorporating realistic SaaS-themed lures, anti-bot protections, and cloud-hosted infrastructure to evade detection. Push Security reports that the EvilTokens platform, alongside these competing kits, has led to a rapid commoditization of device code phishing, with evidence of multi-vector campaigns using QR codes, hyperlinks, and embedded phishing templates. The article highlights the need for organizations to implement conditional access policies to disable the device code flow and monitor for anomalous authentication events, unusual IP addresses, and sessions to mitigate ongoing risks. This article underscores how credential exposures (e.g., the Figure breach) enable downstream attacks—credential stuffing, AI-driven targeted phishing, and help desk social engineering—that bypass legacy MFA via real-time phishing relays and social engineering. It details why legacy MFA (push, SMS, TOTP) and even FIDO2 passkeys remain vulnerable to relay attacks and social engineering, and outlines the architectural requirements for phishing-resistant authentication (cryptographic origin binding, hardware-bound keys, live biometric verification).
Show sources
- Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse — thehackernews.com — 25.03.2026 13:34
- New EvilTokens service fuels Microsoft device code phishing attacks — www.bleepingcomputer.com — 01.04.2026 22:42
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
Information Snippets
-
The campaign abuses Microsoft’s OAuth device authorization flow to generate persistent access tokens that remain valid even after password resets.
First reported: 25.03.2026 13:342 sources, 2 articlesShow sources
- Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse — thehackernews.com — 25.03.2026 13:34
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
Threat actors use Cloudflare Workers and Railway PaaS infrastructure (IPs: 162.220.234[.]41, 162.220.234[.]66, 162.220.232[.]57, 162.220.232[.]99, 162.220.232[.]235) to host phishing landing pages and harvest credentials.
First reported: 25.03.2026 13:341 source, 1 articleShow sources
- Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse — thehackernews.com — 25.03.2026 13:34
-
Attackers employ a multi-hop redirect chain leveraging legitimate vendor redirect services (Cisco, Trend Micro, Mimecast) to bypass email security controls.
First reported: 25.03.2026 13:341 source, 1 articleShow sources
- Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse — thehackernews.com — 25.03.2026 13:34
-
The EvilTokens phishing-as-a-service platform was launched on Telegram in early 2026 and provides automated phishing email delivery, bypass tools, and 24/7 support.
First reported: 25.03.2026 13:342 sources, 3 articlesShow sources
- Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse — thehackernews.com — 25.03.2026 13:34
- New EvilTokens service fuels Microsoft device code phishing attacks — www.bleepingcomputer.com — 01.04.2026 22:42
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
Unit 42 observed anti-bot evasion techniques including disabled right-click, blocked developer tools access, and infinite debugger loops on phishing pages.
First reported: 25.03.2026 13:342 sources, 2 articlesShow sources
- Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse — thehackernews.com — 25.03.2026 13:34
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
Prior device code phishing activity was attributed to Russia-aligned groups including Storm-2372, APT29, UTA0304, UTA0307, and UNK_AcademicFlare.
First reported: 25.03.2026 13:342 sources, 2 articlesShow sources
- Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse — thehackernews.com — 25.03.2026 13:34
- New EvilTokens service fuels Microsoft device code phishing attacks — www.bleepingcomputer.com — 01.04.2026 22:42
-
EvilTokens provides device code phishing capabilities integrated into a malicious kit sold over Telegram, enabling account hijacking for Microsoft accounts.
First reported: 01.04.2026 22:421 source, 1 articleShow sources
- New EvilTokens service fuels Microsoft device code phishing attacks — www.bleepingcomputer.com — 01.04.2026 22:42
-
EvilTokens is under active development with planned future support for Gmail and Okta phishing pages.
First reported: 01.04.2026 22:421 source, 2 articlesShow sources
- New EvilTokens service fuels Microsoft device code phishing attacks — www.bleepingcomputer.com — 01.04.2026 22:42
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
Sekoia observed EvilTokens attacks where victims received emails containing QR codes or hyperlinks to EvilTokens phishing templates, with lures impersonating business content such as financial documents, meeting invitations, or DocuSign/SharePoint shared documents.
First reported: 01.04.2026 22:421 source, 2 articlesShow sources
- New EvilTokens service fuels Microsoft device code phishing attacks — www.bleepingcomputer.com — 01.04.2026 22:42
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
EvilTokens phishing pages impersonate trusted services like Adobe Acrobat or DocuSign, display a verification code, and prompt victims to click a 'Continue to Microsoft' button to reach the legitimate Microsoft device login page.
First reported: 01.04.2026 22:421 source, 1 articleShow sources
- New EvilTokens service fuels Microsoft device code phishing attacks — www.bleepingcomputer.com — 01.04.2026 22:42
-
EvilTokens enables attackers to obtain both short-lived and refresh tokens for persistent access to victim accounts, granting immediate access to email, files, Teams data, and SSO impersonation capabilities across Microsoft services.
First reported: 01.04.2026 22:421 source, 2 articlesShow sources
- New EvilTokens service fuels Microsoft device code phishing attacks — www.bleepingcomputer.com — 01.04.2026 22:42
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
Sekoia identified EvilTokens campaigns with global reach, affecting countries including the United States, Canada, France, Australia, India, Switzerland, and the UAE, with advanced features supporting business email compromise (BEC) activities.
First reported: 01.04.2026 22:421 source, 2 articlesShow sources
- New EvilTokens service fuels Microsoft device code phishing attacks — www.bleepingcomputer.com — 01.04.2026 22:42
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
Device code phishing attacks leveraging OAuth 2.0 Device Authorization Grant flows have surged 37.5 times in early 2026 compared to baseline levels at the start of March 2026.
First reported: 04.04.2026 17:171 source, 1 articleShow sources
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
EvilTokens is identified as the most prominent phishing kit driving the mainstream adoption of device code phishing, enabling low-skilled cybercriminals to execute attacks.
First reported: 04.04.2026 17:171 source, 1 articleShow sources
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
At least 11 distinct phishing kits, including VENOM, SHAREFILE, CLURE, LINKID, AUTHOV, DOCUPOLL, FLOW_TOKEN, PAPRIKA, and DCSTATUS, now offer device code phishing capabilities with realistic SaaS-themed lures and anti-bot protections.
First reported: 04.04.2026 17:171 source, 1 articleShow sources
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
Push Security observed a 15x increase in device code phishing pages detected at the start of March 2026, escalating to 37.5x by early April 2026.
First reported: 04.04.2026 17:171 source, 1 articleShow sources
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
Sekoia’s research on EvilTokens is highlighted as a prominent example of a phishing kit that democratizes device code phishing, making it accessible to a broader range of threat actors.
First reported: 04.04.2026 17:171 source, 1 articleShow sources
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
Push Security recommends disabling the device code flow via conditional access policies and monitoring logs for unexpected device code authentication events, unusual IP addresses, and sessions to mitigate attacks.
First reported: 04.04.2026 17:171 source, 1 articleShow sources
- Device code phishing attacks surge 37x as new kits spread online — www.bleepingcomputer.com — 04.04.2026 17:17
-
The Figure breach exposed 967,200 email records without exploiting any vulnerability or zero-day, enabling downstream credential stuffing, targeted phishing, and help desk social engineering campaigns.
First reported: 09.04.2026 17:021 source, 1 articleShow sources
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
-
Adversaries use exposed email records to run credential stuffing against enterprise portals, VPN gateways, Microsoft 365, Okta, and identity providers, achieving 2–3% success rates that translate to 19,000–29,000 valid credential pairs from 967,200 records.
First reported: 09.04.2026 17:021 source, 1 articleShow sources
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
-
AI-assisted tooling can generate personalized phishing campaigns from a leaked email list in minutes, impersonating internal communications with job title, department, or LinkedIn-derived details to tailor lures.
First reported: 09.04.2026 17:021 source, 1 articleShow sources
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
-
Help desk social engineering leverages valid email addresses and OSINT to impersonate employees in calls to IT support, requesting password resets, MFA device resets, or account unlocks to bypass authentication technology entirely.
First reported: 09.04.2026 17:021 source, 1 articleShow sources
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
-
Legacy MFA (push notifications, SMS codes, TOTP) is vulnerable to real-time phishing relays (AiTM attacks) that forward credentials and MFA challenges between victim and real site, resulting in an authenticated session without needing to break cryptography.
First reported: 09.04.2026 17:021 source, 1 articleShow sources
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
-
Adversary-in-the-middle toolkits like Evilginx, Modlishka, and Muraena are publicly available, actively maintained, and require no advanced tradecraft to operate, making relay attacks baseline adversary capability.
First reported: 09.04.2026 17:021 source, 1 articleShow sources
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
-
FIDO2/WebAuthn passkeys, even cloud-synced, remain vulnerable to SIM swap attacks, account takeover via credential phishing, and recovery flow exploitation, rendering them insufficient alone for phishing-resistant authentication.
First reported: 09.04.2026 17:021 source, 1 articleShow sources
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
-
Phishing-resistant authentication requires cryptographic origin binding, hardware-bound private keys that never leave secure hardware, and live biometric verification of the authorized individual to close relay attack vectors.
First reported: 09.04.2026 17:021 source, 1 articleShow sources
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
-
TokenCore’s platform enforces biometrics, hardware-bound cryptographic authentication, and physical proximity verification simultaneously, eliminating phishing, replay, delegation, and exception pathways.
First reported: 09.04.2026 17:021 source, 1 articleShow sources
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
-
The Figure breach exemplifies how credential exposure creates conditions for downstream authentication abuse, with adversary infrastructure operating continuously against exposed records.
First reported: 09.04.2026 17:021 source, 1 articleShow sources
- When attackers already have the keys, MFA is just another door to open — www.bleepingcomputer.com — 09.04.2026 17:02
Similar Happenings
APT28 DNS hijacking campaigns via compromised SOHO routers observed in 2025–2026 targeting credential theft
APT28 (GRU GTsSS Military Unit 26165) has conducted opportunistic DNS hijacking campaigns since at least August 2025 by compromising small office/home office (SOHO) routers—primarily TP-Link models such as WR841N—to redirect victim traffic through attacker-controlled DNS servers and steal credentials. The campaign peaked in December 2025, compromising over 18,000 networks, including 200 organizations and 5,000 consumer devices, and specifically targeted government agencies such as ministries of foreign affairs, law enforcement, and third-party email providers. TP-Link routers were likely exploited via CVE-2023-50224 to retrieve credentials, which were used in adversary-in-the-middle attacks against browser sessions and desktop applications to harvest credentials for web and email services. APT28 operates a persistent infrastructure of VPSs repurposed as malicious DNS servers, receiving DNS requests from exploited routers and enabling opportunistic triage to identify high-value targets. Microsoft reported this is the first time APT28 has used DNS hijacking at scale to support post-compromise adversary-in-the-middle (AiTM) attacks on TLS connections against Microsoft Outlook on the web domains, intercepting OAuth authentication tokens after successful MFA authentication without requiring additional malware on compromised routers. On April 7, 2026, US authorities dismantled APT28’s US-based DNS hijacking network as part of ‘Operation Masquerade,’ neutralizing compromised routers across 23 states. The operation, led by the FBI and authorized by a court, reset DNS settings on affected TP-Link routers to restore legitimate DNS resolvers from ISPs without impacting functionality or collecting user content. The FBI is working with ISPs to notify affected users and urges router owners to replace outdated devices, update firmware, and verify DNS settings to prevent further exploitation.
Global C-Suite credential theft campaign leverages undocumented Venom PhaaS with AiTM bypass
A credential theft campaign from November 2025 to March 2026 targeted C-suite executives and senior personnel at major organizations worldwide using a previously undocumented phishing-as-a-service (PhaaS) platform named Venom. The campaign used SharePoint-themed lures with embedded QR codes to deliver a multi-stage phishing workflow designed to harvest credentials and bypass multifactor authentication (MFA). Email content included randomized HTML, fabricated email threads, and personalized sender impersonation to evade detection. Victims who passed automated checks were routed to credential harvesters that mimicked legitimate login portals via adversary-in-the-middle (AiTM) techniques, including pre-filled email fields, corporate branding, and identity provider integration. Compromised sessions maintained persistence even after password resets due to valid refresh tokens, unless administrators manually revoked active sessions.
Increased exploitation of legitimate remote access pathways and trusted tools in 2025 intrusions according to Blackpoint Cyber threat analysis
A 2026 analysis of 2025 incident response cases by Blackpoint Cyber finds threat actors increasingly leveraging legitimate remote access pathways and trusted administrative tools to establish initial access and maintain persistence. Rather than relying on software vulnerabilities, attackers primarily abused valid credentials, SSL VPN sessions, and remote monitoring and management (RMM) tools such as ScreenConnect to blend into normal operations. In cloud environments, adversaries captured and reused authenticated session tokens following successful multi-factor authentication (MFA) via adversary-in-the-middle phishing, bypassing detection by appearing as legitimate sessions.
Vishing Attacks Target Okta SSO Accounts for Data Theft
Threat actors are using vishing attacks to steal Okta SSO credentials, bypassing MFA and gaining access to enterprise cloud services. The attacks involve real-time manipulation of phishing pages and social engineering to trick employees into revealing their credentials and MFA codes. Once access is gained, attackers exfiltrate data from integrated platforms like Salesforce and demand extortion payments. The phishing kits used in these attacks are sold as a service and are actively employed by multiple hacking groups targeting identity providers and cryptocurrency platforms. Okta recommends using phishing-resistant MFA methods to mitigate these threats. Attackers use Telegram channels to receive stolen credentials and adapt their campaign based on the MFA or authentication solution the target is using. Phishing kits allow attackers to generate fake MFA notifications to bypass MFA protections.
Credential Theft and Account Compromise Surge in 2025
In 2025, cyber threat actors significantly increased their focus on credential theft, leading to a 389% rise in account compromise incidents, which constituted 55% of all attacks observed by eSentire. Credential access represented 75% of malicious activity, with two-thirds aimed at account takeovers and the remaining third used for phishing campaigns. Microsoft 365 accounts were primary targets. The use of phishing-as-a-service (PhaaS) kits, such as Tycoon2FA, FlowerStorm, and EvilProxy, fueled business email compromise (BEC) attacks. These kits are sophisticated, continuously updated, and designed to bypass modern security controls like multifactor authentication (MFA). While BEC attacks declined to less than 10% of malicious activity, they remained a top threat for companies, particularly in real estate, finance, retail, and construction. The report also highlighted a 14-fold increase in security incidents involving email bombing and IT Help Desk impersonation, a 300% spike in the ClickFix lure, and varying trends in cyber incidents across different industries.