Intel Name: New widespread eviltokens kit: device code phishing as-a-service
Date of Scan: March 31, 2026
Impact: High
Summary: The digital threat landscape is currently witnessing a dangerous evolution in how attackers bypass traditional security perimeters. Security researchers have identified a growing class of device code phishing campaigns leveraging token interception techniques, sometimes associated with kits such as ‘EvilTokens’ where observed. Unlike traditional phishing that asks for a password, this method exploits modern authentication workflows used by cloud services. By taking advantage of how users connect their devices to corporate accounts, attackers can gain persistent access without ever needing a victim’s password. For any executive stakeholder, understanding this shift is vital. This is not just another email scam; it is a direct assault on the session tokens that keep your enterprise connected and productive.
Actors leveraging device code phishing techniques, including those using kits such as ‘EvilTokens’ where observed, are primarily motivated by financial gain and, in some cases, espionage. They operate within a professionalized “as-a-service” model. This means that highly technical developers build the “kit” and then sell or lease it to other criminals. Their primary goal is to harvest high-value session tokens from employees. These tokens act as a “digital pass” that keeps a user logged in to sensitive cloud applications. Once an attacker possesses these tokens, they can effectively bypass MFA protections for the duration of the session. For a business leader, this highlights a terrifying reality. An adversary can sit inside your environment, reading emails and accessing files, while appearing as a perfectly legitimate employee.
The impact of a successful breach through this method is far-reaching and can lead to massive operational disruption. When an attacker successfully uses device code phishing to compromise an account, they aren’t just looking at one inbox. They are often after the “crown jewels” of the company, such as intellectual property, strategic roadmaps, or sensitive financial data. Because the attack targets session-level trust, some traditional MFA-based safeguards may be less effective without additional identity monitoring. This leads to a loss of competitive advantage and significant brand damage. Furthermore, the regulatory consequences of such a data leak can result in heavy fines and long-term legal complications that drain corporate resources and distract from core business goals.
To understand the “how” of this attack, imagine you are trying to pair a new smart TV to your streaming account. The TV gives you a short code and tells you to enter it on your phone to “authorize” the device. Attackers are now using this exact process to steal access. They send a deceptive message to an employee, often disguised as a security alert or a required software update. The message asks the user to enter a specific “device code” into a legitimate-looking login page. When the employee does this, they aren’t authorizing their own device; they are authorizing the attacker’s device. It is like accidentally handing a stranger a copy of your office keycard while you think you are just checking your own ID badge at the front desk.
To counter these evolving methods, organizations must move toward a strategy of identity threat detection. Traditional defenses that look for malicious attachments or “bad” links often fail here. This is because the attacker is leveraging legitimate cloud authentication processes that your security tools are programmed to trust. Protecting the enterprise now requires a deep focus on the identity layer. You must be able to see when an authorization request is coming from an unusual location or a non-compliant device. By prioritizing the security of the identity perimeter, you can identify these deceptive pairing requests before they result in a total account takeover. Identity is the new firewall, and it must be monitored with the highest level of scrutiny.
The most effective way to stop an attacker who has stolen a session token is through behavioral analytics. While a token might be “valid” in the eyes of the cloud provider, the behavior of the person using that token will eventually reveal the truth. Behavioral models create a baseline of what a “normal day” looks like for every employee. If a user typically accesses files from an office in New York but suddenly starts downloading the entire legal directory from a suspicious IP address, the system flags the anomaly. This proactive approach enables security teams to identify and respond to compromised sessions quickly, including token revocation where supported. By focusing on the “who, what, and where” of account activity, you can turn the tide against attackers who rely on blending into your daily business traffic.
Gurucul provides a robust defense against the “EvilTokens” kit by looking beyond simple logins and focusing on the underlying risk of every session. Our platform ingests data from cloud providers and identity systems to provide a unified view of user activity. When a device code phishing attempt occurs, Gurucul’s REVEAL platform analyzes the context of the authorization. We look for indicators such as “impossible travel”—where a user authorizes a device from a location they couldn’t possibly reach in that timeframe. By correlating these signals, Gurucul assigns a risk score to the session. This enables the Security Operations Center (SOC) to prioritize high-risk sessions and initiate rapid containment actions before an attacker can establish persistence.
A central part of our strategy is the Gurucul Identity Threat Detection and Response (ITDR) solution. This product is specifically designed to protect the modern identity perimeter against sophisticated token-theft kits. ITDR monitors the entire lifecycle of a session, from the initial pairing to the final logout. If an attacker tries to use a stolen session token to escalate their privileges or access sensitive data, Gurucul identifies suspicious session behavior in near real-time. We provide automation to trigger response actions such as session invalidation or forced re-authentication, depending on integration capabilities. For executive stakeholders, this significantly reduces the risk of unauthorized access to cloud applications, even if an employee is tricked by a clever phishing message.
Surviving the rise of professionalized cybercrime requires more than just better passwords; it requires strategic resilience. The “EvilTokens” campaign is a reminder that adversaries will always find ways to exploit the “human element” and the trust we place in our digital processes. By partnering with Gurucul, your organization gains the power of behavior-based security that evolves as fast as the threats do. We help you move away from a reactive “detect and patch” mindset and toward a proactive “analyze and protect” model. This ensures that your business can continue to innovate and serve customers with the confidence that your identities, your data, and your reputation are guarded by the industry’s most advanced analytics engine.
For a full technical breakdown of this threat and specific indicators of compromise, please visit the Gurucul Community: