Inside an AIenabled device code phishing campaign
Microsoft Defender Security Research has identified a widespread phishing campaign that abuses the Device Code Authentication flow to compromise organizational accounts. This campaign uses automation and dynamic code generation to bypass the usual 15-minute expiration window for device codes, increasing its success rate. The activity is linked to EvilToken, a Phishing-as-a-Service toolkit facilitating large-scale device code abuse. The campaign involves phishing domains such as office365-login. com and portal-azure. com. There is no known exploit in the wild beyond this campaign, and no official patch or fix is indicated.
AI Analysis
Technical Summary
This threat involves a phishing campaign leveraging the Device Code Authentication flow to gain unauthorized access to organizational accounts. Unlike traditional device code attacks that are limited in scope and constrained by a 15-minute code expiration, this campaign uses AI-enabled automation and dynamic code generation to circumvent these limitations. The campaign is associated with EvilToken, a Phishing-as-a-Service toolkit that enables large-scale abuse of device code authentication. Indicators include several phishing domains mimicking legitimate Microsoft services. The campaign's medium severity reflects its potential impact on organizational account security, though no direct exploit or vulnerability in software is reported.
Potential Impact
The campaign can lead to compromise of organizational accounts by tricking users into providing device codes through phishing sites. This abuse of the Device Code Authentication flow enables attackers to bypass standard expiration constraints, potentially allowing unauthorized access to sensitive resources. The impact is primarily account compromise and potential data exposure or misuse within affected organizations. There is no indication of exploitation of a software vulnerability or direct system compromise beyond credential theft.
Mitigation Recommendations
No official patch or fix is available as this is a phishing campaign abusing legitimate authentication flows rather than a software vulnerability. Organizations should educate users about phishing risks related to device code authentication and monitor for suspicious authentication activity. Blocking or monitoring access to known phishing domains such as office365-login.com and portal-azure.com can help reduce risk. Review and enforce multi-factor authentication policies and consider conditional access controls to limit the impact of compromised credentials.
Indicators of Compromise
- domain: office365-login.com
- domain: portal-azure.com
- domain: a7b2-c9d4.office-verify.net
Inside an AIenabled device code phishing campaign
Description
Microsoft Defender Security Research has identified a widespread phishing campaign that abuses the Device Code Authentication flow to compromise organizational accounts. This campaign uses automation and dynamic code generation to bypass the usual 15-minute expiration window for device codes, increasing its success rate. The activity is linked to EvilToken, a Phishing-as-a-Service toolkit facilitating large-scale device code abuse. The campaign involves phishing domains such as office365-login. com and portal-azure. com. There is no known exploit in the wild beyond this campaign, and no official patch or fix is indicated.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a phishing campaign leveraging the Device Code Authentication flow to gain unauthorized access to organizational accounts. Unlike traditional device code attacks that are limited in scope and constrained by a 15-minute code expiration, this campaign uses AI-enabled automation and dynamic code generation to circumvent these limitations. The campaign is associated with EvilToken, a Phishing-as-a-Service toolkit that enables large-scale abuse of device code authentication. Indicators include several phishing domains mimicking legitimate Microsoft services. The campaign's medium severity reflects its potential impact on organizational account security, though no direct exploit or vulnerability in software is reported.
Potential Impact
The campaign can lead to compromise of organizational accounts by tricking users into providing device codes through phishing sites. This abuse of the Device Code Authentication flow enables attackers to bypass standard expiration constraints, potentially allowing unauthorized access to sensitive resources. The impact is primarily account compromise and potential data exposure or misuse within affected organizations. There is no indication of exploitation of a software vulnerability or direct system compromise beyond credential theft.
Mitigation Recommendations
No official patch or fix is available as this is a phishing campaign abusing legitimate authentication flows rather than a software vulnerability. Organizations should educate users about phishing risks related to device code authentication and monitor for suspicious authentication activity. Blocking or monitoring access to known phishing domains such as office365-login.com and portal-azure.com can help reduce risk. Review and enforce multi-factor authentication policies and consider conditional access controls to limit the impact of compromised credentials.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-april-2026/"]
- Adversary
- null
- Pulse Id
- 69d4175ab0f5278eae91f1cf
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainoffice365-login.com | — | |
domainportal-azure.com | — | |
domaina7b2-c9d4.office-verify.net | — |
Threat ID: 69d425f50a160ebd92dedd8b
Added to database: 4/6/2026, 9:30:29 PM
Last enriched: 4/6/2026, 9:45:57 PM
Last updated: 4/7/2026, 3:24:24 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.