Device Code Phishing Hits 340+ Microsoft 365 Orgs in 5 Countries
EvilTokens phishing platform targets Microsoft 365 identities across US, Canada, Australia, New Zealand, and Germany. OAuth abuse bypasses MFA to steal access tokens.
An active device code phishing campaign has compromised Microsoft 365 identities across more than 340 organizations in five countries, leveraging OAuth authentication flows to bypass multi-factor authentication. Security researchers at Huntress first identified the campaign on February 19, 2026, with activity accelerating since.
The operation targets organizations in the United States, Canada, Australia, New Zealand, and Germany, hitting construction, non-profits, real estate, manufacturing, financial services, healthcare, legal, and government sectors.
How Device Code Phishing Works
Device code authentication exists for legitimate scenarios—smart TVs, IoT devices, and other systems without full keyboards need a way to authenticate users. The flow works by displaying a code that users enter on a separate device (typically their phone or computer) at microsoft.com/devicelogin.
Attackers abuse this by:
- Requesting a device code from Microsoft Entra ID via the legitimate API
- Sending phishing emails directing victims to the real Microsoft device login page
- Convincing victims to enter the attacker-provided code
- Capturing the resulting access and refresh tokens
Because victims authenticate on Microsoft's actual infrastructure and complete their real MFA prompts, the attack bypasses traditional phishing protections that flag lookalike domains. The tokens generated grant the attacker persistent access even after password resets.
EvilTokens: A New PhaaS Platform
Huntress attributed the Railway-based attack infrastructure to EvilTokens, a phishing-as-a-service (PhaaS) platform that debuted on Telegram in March 2026. The platform provides aspiring attackers with ready-made tooling for device code phishing without requiring technical expertise.
The Tycoon 2FA takedown we covered last week disrupted one major PhaaS operation, but EvilTokens demonstrates how quickly the ecosystem regenerates. New platforms emerge to fill enforcement gaps almost immediately.
Attack Infrastructure
The campaign uses a sophisticated redirect chain to evade detection:
- Landing sites: Cloudflare Workers
- Intermediaries: Vercel and compromised legitimate websites
- Final payload: Railway.com infrastructure for credential harvesting
- Trust enhancement: Routing through security vendor services (Cisco, Trend Micro, Mimecast) to appear legitimate
Huntress identified several Railway IP addresses associated with the campaign:
- 162.220.234[.]41
- 162.220.234[.]66
- 162.220.232[.]57
- 162.220.232[.]99
- 162.220.232[.]235
Organizations should consider blocking these addresses and monitoring for authentication attempts from Railway infrastructure.
Lure Variations
The threat actors employ multiple social engineering themes:
- Construction bid requests
- DocuSign impersonation
- Voicemail notification alerts
- Microsoft Forms abuse
- Landing page code generation prompts
This variety suggests either multiple operator groups using the same platform or deliberate A/B testing to optimize conversion rates across industries.
Russian Attribution
Multiple security vendors have linked device code phishing campaigns to Russia-aligned threat actors including Storm-2372, APT29 (Cozy Bear), UTA0304, UTA0307, and UNK_AcademicFlare. The targeting pattern and infrastructure choices align with previous Russian operations focused on government and critical infrastructure access.
Palo Alto Networks Unit 42 noted the campaign employs anti-analysis techniques including disabled right-click functionality, developer tool blocking, and debugger detection loops—sophistication that suggests nation-state resources rather than commodity crime.
Detection and Response
If your organization may have been targeted:
- Scan sign-in logs for authentications from the Railway IP addresses listed above
- Revoke all refresh tokens for any affected user accounts immediately
- Block authentication attempts from Railway infrastructure at the conditional access policy level
- Monitor for token abuse patterns indicating persistent access
- Review browser cookie access since the campaign exfiltrates cookies on page load
The persistent token problem requires specific attention. Unlike password-based compromises where changing credentials revokes access, OAuth tokens remain valid until explicitly revoked. Organizations must audit token grants and implement continuous access evaluation where possible.
Why This Matters
Device code phishing represents a fundamental challenge because it exploits legitimate authentication infrastructure. Users aren't visiting fake websites—they're authenticating on real Microsoft pages. The attack works precisely because MFA functions as designed.
Microsoft has attempted mitigation through conditional access policies that restrict device code flows, but many organizations haven't enabled these controls. The OAuth abuse patterns we've tracked show that token-based attacks will likely intensify as password-only compromises become less valuable.
For organizations facing elevated phishing risk, reviewing our practical phishing defense examples can help train users to recognize suspicious authentication requests before they complete the OAuth flow.
Related Articles
FBI Warns Russian Hackers Compromised Thousands of Signal, WhatsApp Accounts
FBI and CISA alert reveals Russian intelligence operatives have hijacked thousands of Signal and WhatsApp accounts belonging to US officials, military, and journalists through phishing attacks.
Mar 22, 2026Russia-Linked DRILLAPP Backdoor Weaponizes Edge Browser Debugging
New JavaScript backdoor targets Ukrainian entities using Microsoft Edge's debugging features for stealth. S2 Grupo links campaign to Laundry Bear threat group.
Mar 17, 2026APT28 Uses BEARDSHELL and COVENANT to Spy on Ukraine
Russian GRU-linked APT28 deploys BEARDSHELL and COVENANT implants for long-term surveillance of Ukrainian military personnel. ESET research reveals cloud storage abuse for C2.
Mar 10, 2026APT28 Linked to MSHTML Zero-Day Exploited Before Patch
Security researchers tie Russia's APT28 to CVE-2026-21513 exploitation using malicious LNK files. The MSHTML zero-day was weaponized weeks before Microsoft's February patch.
Mar 3, 2026