BleepingComputer, Arctic Wolf, and others describe EvilTokens abusing the Microsoft device code flow to hijack accounts, reinforcing device-code phishing as a scalable Microsoft 365 takeover vector.
New EvilTokens service fuels Microsoft device code phishing attacks
EvilTokens abuses Microsoft device code flow for account takeovers
EvilTokens ramps up device code phishing targeting Microsoft 365 users
phishing campaign targeting Microsoft 365 that abuses the OAuth device code flow to trick victims into providing authentication codes.
Arctic Wolf has recently observed a phishing campaign targeting Microsoft 365 that abuses the OAuth device code flow to trick victims into providing authentication codes.
This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.
← Back to Cyber Security