<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft Forms — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/microsoft-forms/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 21:01:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/microsoft-forms/feed.xml" rel="self" type="application/rss+xml"/><item><title>EvilTokens PhaaS Platform Leverages AI for Device Code Phishing Attacks</title><link>https://feed.craftedsignal.io/briefs/2026-05-eviltokens-phishing/</link><pubDate>Thu, 14 May 2026 21:01:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-eviltokens-phishing/</guid><description>The EvilTokens phishing-as-a-service (PhaaS) platform sold on Telegram is capable of launching device code phishing attacks at scale, leveraging AI to generate convincing and personalized lures, enabling aspiring cybercriminals to bypass traditional security measures, including MFA.</description><content:encoded><![CDATA[<p>The EvilTokens platform represents a shift in the phishing landscape by offering phishing-as-a-service (PhaaS) on Telegram. This platform allows individuals with limited technical skills to conduct sophisticated device code phishing attacks. Sold for $1,500 plus a $500 maintenance fee, EvilTokens provides AI-generated lures, dynamic code generation, and post-compromise automation. The platform was used in a 16-day campaign starting on March 2, 2026, affecting 344 organizations across five countries. EvilTokens exploits a legitimate Microsoft authentication flow, making it difficult to detect with traditional security measures. The platform also leverages Railway, a legitimate Platform-as-a-Service (PaaS).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker purchases access to the EvilTokens PhaaS platform on Telegram for $1,500 + $500 maintenance.</li>
<li>Attacker uses EvilTokens to initiate a device code authentication process against a target service (e.g., Microsoft 365).</li>
<li>EvilTokens generates a personalized phishing email using AI, mimicking legitimate requests for construction bid proposals, DocuSign documents, or Microsoft Forms.</li>
<li>The phishing email is sent to the victim, containing a link to a legitimate Microsoft page prompting for a device code.</li>
<li>The victim clicks the link and enters the provided code, unwittingly authorizing the attacker&rsquo;s session.</li>
<li>EvilTokens captures the valid session token through its backend infrastructure, relayed through Railway.</li>
<li>The attacker uses the captured session token to gain unauthorized access to the victim&rsquo;s account.</li>
<li>After gaining access, EvilTokens can draft convincing wire fraud emails in the victim&rsquo;s voice.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The EvilTokens campaign impacted 344 organizations across five countries in a 16-day period. Successful attacks result in unauthorized access to accounts, potentially leading to data theft, business email compromise, and financial fraud. The use of AI in generating personalized lures increases the likelihood of successful phishing attempts. Traditional email security solutions such as Cisco, Trend Micro, and Mimecast were unable to detect the attacks, as the emails and URLs appeared legitimate.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Microsoft 365 login events for unusual activity, such as logins originating from Railway infrastructure IPs, to detect potential EvilTokens attacks.</li>
<li>Implement user awareness training to educate employees about device code phishing and the risks of entering codes from unsolicited emails.</li>
<li>Deploy the Sigma rule &ldquo;Detect Device Code Phishing via Railway Infrastructure&rdquo; to identify suspicious login activity associated with the Railway PaaS.</li>
<li>Block access to known EvilTokens infrastructure, if any are identified, at the network level.</li>
<li>Monitor for unusual authentication flows or patterns that deviate from typical user behavior, especially those involving device code authentication.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>phishing</category><category>device code phishing</category><category>AI</category><category>Telegram</category></item></channel></rss>