Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New widespread EvilTokens kit: device code phishing as-a-service

0
Medium
Published: Tue Mar 31 2026 (03/31/2026, 16:14:29 UTC)
Source: AlienVault OTX General

Description

EvilTokens is a new Phishing-as-a-Service offering a turnkey Microsoft device code phishing kit. It enables attackers to harvest access and refresh tokens, granting unauthorized access to victims' Microsoft accounts. The kit supports post-compromise operations, allowing data exfiltration from various Microsoft services. EvilTokens has been rapidly adopted by cybercriminals since March 2026, impacting organizations globally. The service provides advanced capabilities for account takeover, including token conversion to Primary Refresh Tokens and browser cookies for persistent access. Phishing campaigns using EvilTokens target employees in finance, HR, logistics, and sales, primarily for Business Email Compromise attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 18:54:42 UTC

Technical Analysis

EvilTokens represents a sophisticated Phishing-as-a-Service (PhaaS) offering that leverages the OAuth 2.0 device code flow to phish Microsoft account tokens rather than traditional credentials. Attackers use the kit to create turnkey phishing campaigns that trick users into authorizing device codes, which then yield access and refresh tokens. These tokens allow attackers to access Microsoft 365 services such as email, OneDrive, and Teams without needing passwords. The kit includes capabilities to convert harvested tokens into Primary Refresh Tokens (PRTs) and browser cookies, enabling persistent access and evasion of standard detection mechanisms. Post-compromise, attackers can exfiltrate sensitive data and conduct Business Email Compromise (BEC) attacks by impersonating legitimate employees, particularly targeting finance, HR, logistics, and sales personnel. The EvilTokens kit has been rapidly adopted since March 2026, with numerous malicious domains identified as part of its infrastructure. The threat exploits OAuth 2.0’s device code flow, which is designed for devices with limited input capabilities, but here is abused to bypass multi-factor authentication and password protections. The lack of a CVE or known exploits in the wild suggests this is a relatively new threat, but its rapid spread and advanced token manipulation techniques indicate a significant risk to organizations relying on Microsoft cloud services.

Potential Impact

The EvilTokens phishing kit can lead to unauthorized access to Microsoft 365 accounts, resulting in significant confidentiality breaches, including exposure of emails, documents, and internal communications. The ability to convert tokens into PRTs and browser cookies allows attackers to maintain persistent access, increasing the risk of prolonged espionage, data theft, and fraudulent activities. Business Email Compromise attacks enabled by this kit can cause financial losses, reputational damage, and operational disruption, especially in targeted departments like finance and HR. Organizations globally face risks of intellectual property theft, regulatory non-compliance due to data breaches, and potential lateral movement within corporate networks. The threat’s use of OAuth tokens circumvents traditional password-based defenses and multi-factor authentication, complicating detection and response efforts. The widespread adoption of Microsoft 365 services means a large attack surface, and the phishing-as-a-service model lowers the barrier for less skilled attackers to launch impactful campaigns. Overall, the threat can severely impact organizational security posture, data integrity, and business continuity.

Mitigation Recommendations

1. Implement strict conditional access policies in Microsoft 365 to restrict OAuth token issuance and enforce device compliance and location-based access controls. 2. Monitor OAuth token usage and anomalous authentication patterns using Microsoft Cloud App Security or equivalent tools to detect suspicious token activity. 3. Educate employees, especially in finance, HR, logistics, and sales, about device code phishing tactics and how to recognize suspicious authorization prompts. 4. Deploy email security solutions with advanced phishing detection capabilities to block malicious domains and URLs associated with EvilTokens campaigns. 5. Regularly review and revoke suspicious or unused refresh tokens and Primary Refresh Tokens to limit attacker persistence. 6. Enforce multi-factor authentication methods that are resistant to token phishing, such as hardware security keys or certificate-based authentication. 7. Establish rapid incident response procedures to investigate and remediate compromised accounts, including password resets and token revocation. 8. Use endpoint detection and response (EDR) tools to identify post-compromise activities such as data exfiltration or lateral movement. 9. Collaborate with threat intelligence providers to update blocklists for domains linked to EvilTokens infrastructure. 10. Consider implementing OAuth app consent policies to restrict which applications can request tokens within the organization.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.sekoia.io/new-widespread-eviltokens-kit-device-code-phishing-as-a-service-part-1"]
Adversary
null
Pulse Id
69cbf2e593a215d1c46c988a
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainauthdocspro.com
domainbackdoor-hub.com
domainbumpgames.net
domaincarbatterygurgaon.com
domaincareldutoit-el.co.za
domaineqfit.co.za
domaineventcalender-schedule.com
domainevobothub.org
domainframebound.cloud
domaininfinitechai.org
domainmacmamo.com
domainmirsanotolastik.com
domainmirzanyapi.com
domainnewmobilepolojean.com
domainnotificationsmanagersec.com
domainpelangiservice.com
domainprcservis.com
domainserenitygovsupplys.com
domainsmstltle.net
domainsuctwocesonesstory.com
domainthesafarigarden.com
domaintopbuysella.com
domaintotalhomesafe.com
domainxlkconsulting.co.za
domainyankeepine.co
domainyouremplregroup.com
domaindocusend.networkssolutionmail.com
domaininternalmemorecord.bxwancheng.com
domainpromanager.outboundciwidey.com
domainsignaturerequired.thecoolcactus.com
domainstatushelper.aguasomos.com
domainupdate.youcreadio.cfd
domainwell.atlantaperlnatal.com

Threat ID: 69cc1498e6bfc5ba1d3022bc

Added to database: 3/31/2026, 6:38:16 PM

Last enriched: 3/31/2026, 6:54:42 PM

Last updated: 4/1/2026, 3:53:20 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses