📋 Compliance & Policy

EvilTokens: Phishing's Drag-and-Drop Nightmare for Microsoft Logins

EvilTokens just landed, and it's arming script kiddies with pro-level phishing tools for Microsoft accounts. Business email compromise? Now easier than ever.

EvilTokens phishing dashboard showing live Microsoft device code proxy and session hijack

⚡ Key Takeaways

  • EvilTokens makes advanced Microsoft device code phishing accessible to amateurs via a user-friendly dashboard. 𝕏
  • It enables smoothly account hijacks for BEC attacks, bypassing traditional MFA with real-time proxying. 𝕏
  • Expect a surge in BEC incidents; defenses need stricter auth policies and employee training. 𝕏
Published by

Threat Digest

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.