
Kali365 Exposes the Industrial Scale of M365 OAuth Token Theft
FBI alert on Kali365 highlights industrialized OAuth token theft against Microsoft 365, exposing gaps in mainstream reporting that treat these as simple phishing rather than scalable criminal infrastructure.
The FBI advisory on Kali365 marks a clear inflection point in adversary tradecraft: the full commoditization of Microsoft 365 compromise via legitimate OAuth flows. Unlike credential-harvesting kits of the past, Kali365 supplies AI-generated lures, automated campaign orchestration, and real-time token dashboards that allow even low-skill operators to obtain persistent mailbox access without ever touching passwords or MFA prompts. This model directly mirrors the evolution seen in earlier phishing-as-a-service platforms documented by Proofpoint in its 2025 reports on EvilProxy and similar intermediaries, yet mainstream coverage has continued to frame these incidents as isolated social-engineering events rather than industrialized supply chains. Arctic Wolf’s post-incident telemetry from April 2026 campaigns further reveals downstream monetization paths—token reuse for BEC keyword monitoring and malicious inbox rules—that extend dwell time far beyond typical credential-theft operations. The platform’s tiered pricing ($250–$2,000) and multi-language lure generation indicate a maturing criminal market that lowers barriers while concentrating technical risk in reusable access artifacts. Government and enterprise reliance on M365 for core communications creates concentrated blast radius; token persistence effectively bypasses endpoint detection in environments where conditional access policies remain inconsistently applied. This threat vector intersects with broader patterns of state-adjacent and criminal convergence observed in recent Microsoft disruptions of similar services, underscoring how defensive focus on password hygiene alone now systematically underestimates the attack surface.
SENTINEL: Token-reuse economies will drive a measurable rise in supply-chain BEC against mid-tier M365 tenants within 90 days unless conditional-access enforcement is standardized.
Sources (3)
- [1]Primary Source(https://therecord.media/fbi-warns-of-kali365-phishing-attacks)
- [2]Related Source(https://www.proofpoint.com/us/blog/threat-insight)
- [3]Related Source(https://arcticwolf.com/resources/blog/)