EvilTokens phishing kit commoditizes Microsoft device code attacks for business email compromise
A new phishing-as-a-service kit called EvilTokens is being sold on Telegram, turning OAuth device code phishing against Microsoft accounts into a turnkey attack. Victims receive emails with PDFs or HTML files containing QR codes or links to pages impersonating Adobe, DocuSign, or SharePoint. The kit captures Microsoft authentication tokens in real time - bypassing MFA - and gives attackers persistent access for business email compromise. The developer says Gmail and Okta support is coming next.
- Check
- Review your Microsoft Entra ID logs for unusual device code authentication flows, especially from unfamiliar locations or devices.
- Affected
- Any organization using Microsoft 365 with users who may click on phishing emails disguised as document-sharing notifications.
- Fix
- Restrict or disable the device code authentication flow in Microsoft Entra ID conditional access policies if your organization doesn't need it. Deploy phishing-resistant MFA (FIDO2 hardware keys). Train finance, HR, and sales teams to recognize fake document verification pages. Monitor for anomalous token grants in Entra ID sign-in logs.