Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Inside an AIenabled device code phishing campaign

0
Medium
Published: Mon Apr 06 2026 (04/06/2026, 20:28:10 UTC)
Source: AlienVault OTX General

Description

Microsoft Defender Security Research has identified a widespread phishing campaign that abuses the Device Code Authentication flow to compromise organizational accounts. This campaign uses automation and dynamic code generation to bypass the usual 15-minute expiration window for device codes, increasing its success rate. The activity is linked to EvilToken, a Phishing-as-a-Service toolkit facilitating large-scale device code abuse. The campaign involves phishing domains such as office365-login. com and portal-azure. com. There is no known exploit in the wild beyond this campaign, and no official patch or fix is indicated.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/06/2026, 21:45:57 UTC

Technical Analysis

This threat involves a phishing campaign leveraging the Device Code Authentication flow to gain unauthorized access to organizational accounts. Unlike traditional device code attacks that are limited in scope and constrained by a 15-minute code expiration, this campaign uses AI-enabled automation and dynamic code generation to circumvent these limitations. The campaign is associated with EvilToken, a Phishing-as-a-Service toolkit that enables large-scale abuse of device code authentication. Indicators include several phishing domains mimicking legitimate Microsoft services. The campaign's medium severity reflects its potential impact on organizational account security, though no direct exploit or vulnerability in software is reported.

Potential Impact

The campaign can lead to compromise of organizational accounts by tricking users into providing device codes through phishing sites. This abuse of the Device Code Authentication flow enables attackers to bypass standard expiration constraints, potentially allowing unauthorized access to sensitive resources. The impact is primarily account compromise and potential data exposure or misuse within affected organizations. There is no indication of exploitation of a software vulnerability or direct system compromise beyond credential theft.

Mitigation Recommendations

No official patch or fix is available as this is a phishing campaign abusing legitimate authentication flows rather than a software vulnerability. Organizations should educate users about phishing risks related to device code authentication and monitor for suspicious authentication activity. Blocking or monitoring access to known phishing domains such as office365-login.com and portal-azure.com can help reduce risk. Review and enforce multi-factor authentication policies and consider conditional access controls to limit the impact of compromised credentials.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-april-2026/"]
Adversary
null
Pulse Id
69d4175ab0f5278eae91f1cf
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainoffice365-login.com
domainportal-azure.com
domaina7b2-c9d4.office-verify.net

Threat ID: 69d425f50a160ebd92dedd8b

Added to database: 4/6/2026, 9:30:29 PM

Last enriched: 4/6/2026, 9:45:57 PM

Last updated: 4/7/2026, 3:24:24 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses