基于 OAuth 设备代码流滥用与 PaaS 基础设施托管的新型钓鱼攻击,标志着企业身份威胁进入合法协议劫持、可信资源伪装、无密码入侵的新阶段。Arctic Wolf 披露的 EvilTokens 相关活动表明,攻击者已实现攻击工业化、服务化、规模化 ...
The phishing-as-a-service toolkit leverages legitimate authentication to capture tokens and access Microsoft 365 services.
Device code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant flow to hijack accounts have surged more than 37 times this year.
A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft ...
Device code phishing targets 340+ Microsoft 365 orgs since Feb 2026 via OAuth abuse, enabling persistent token hijacking and ...
This story was originally published on Cybersecurity Dive. To receive daily news and insights, subscribe to our free daily Cybersecurity Dive newsletter. Russia-backed threat actors have attacked a ...
Proofpoint reports phishing surge abusing Microsoft OAuth 2.0 device code flow Victims enter codes on real Microsoft domains, granting attackers access tokens Proofpoint advises blocking device code ...
Cybercriminals and state-sponsored hackers are increasingly exploiting Microsoft’s legitimate OAuth 2.0 device authorization process to hijack enterprise accounts, bypassing multifactor authentication ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果