
Machine code phishing assaults that abuse the OAuth 2.0 Machine Authorization Grant move to hijack accounts have surged greater than 37 instances this 12 months.
In such a assault, the risk actor sends a tool authorization request to a service supplier and receives a code, which is shipped to the sufferer beneath varied pretexts.
Subsequent, the sufferer is tricked into coming into the code on the legit login web page, thus authorizing the attacker’s gadget to entry the account by way of legitimate entry and refresh tokens.
This move was designed to simplify connecting units that wouldn’t have accessible enter choices (e.g., IoT units, printers, streaming units, and good TVs).

Supply: Push Safety
The gadget code phishing method was first documented in 2020, however malicious exploitation was recorded a number of years later, and has been utilized by each state-hackers and financially-motivated ones [1, 2, 3, 4].
Researchers at Push Safety noticed a large improve in using these assaults, warning that they’ve been extensively adopted by cybercriminals.
“Initially of March (2026), we’d noticed a 15x improve in gadget code phishing pages detected by our analysis workforce this 12 months, with a number of kits and campaigns being tracked — with the package now recognized as EvilTokens essentially the most distinguished. That determine has now risen to 37.5x.” – Push Safety
Earlier this week, risk detection and response firm Sekoia printed analysis on the EvilTokens phishing-as-a-service (PhaaS) operation. The researchers underline that it’s a distinguished instance of a phishing package that “democratizes” gadget code phishing, making it accessible to low-skilled cybercriminals.
Push agrees that EvilTokens has been a serious driver of the method’s mainstream adoption, however notes that there are a number of different platforms competing on the identical market, which may change into extra distinguished within the occasion of legislation enforcement disrupting EvilTokens:
- VENOM – A closed-source PhaaS package providing each gadget code phishing and AiTM capabilities. Its gadget code part seems to be an EvilTokens clone.
- SHAREFILE – A package themed round Citrix ShareFile doc transfers, utilizing node-based backend endpoints to simulate file sharing and set off gadget code flows.
- CLURE – A package utilizing rotating API endpoints and an anti-bot gate, with SharePoint-themed lures and backend infrastructure on DigitalOcean.
- LINKID – A package leveraging Cloudflare problem pages and self-hosted APIs, utilizing Microsoft Groups and Adobe-themed lures.
- AUTHOV – A employees.dev-hosted package utilizing popup-based gadget code entry and Adobe document-sharing lures.
- DOCUPOLL – A package hosted on GitHub Pages and employees.dev that mimics DocuSign workflows, together with injected replicas of actual pages.
- FLOW_TOKEN – A employees.dev-hosted package utilizing Tencent Cloud backend infrastructure, with HR and DocuSign-themed lures and popup-based flows.
- PAPRIKA – An AWS S3–hosted package utilizing Microsoft login clone pages with Workplace 365 branding and a pretend Okta footer.
- DCSTATUS – A minimal package with generic Microsoft 365 “Safe Entry” lures and restricted seen infrastructure markers.
- DOLCE – A Microsoft PowerApps-hosted package with Dolce & Gabbana–themed lures, probably a one-off or red-team-style implementation slightly than extensively used.
It must be famous that aside from Venom and EvilTokens, the names of the opposite phishing kits got by Push researchers to trace the malicious exercise.
Push Safety additionally printed a video exhibiting how the DOCUPOLL package works. The risk actor makes use of DocuSign branding and a lure for an alleged contract, asking the sufferer to signal into the Microsoft Workplace software.
In whole, there are no less than 11 phishing kits providing cybercriminals such a assault, all utilizing practical SaaS-themed lures, anti-bot protections, and abusing cloud platforms for internet hosting.
To dam device-code phishing assaults, Push Safety means that customers disable the move when not wanted by setting conditional entry insurance policies on their accounts.
Additionally it is beneficial to observe logs for sudden gadget code authentication occasions, uncommon IP addresses, and periods.
Automated pentesting proves the trail exists. BAS proves whether or not your controls cease it. Most groups run one with out the opposite.
This whitepaper maps six validation surfaces, reveals the place protection ends, and supplies practitioners with three diagnostic questions for any device analysis.

