
OAuth Consent Phishing: The Structural Collapse of MFA as Enterprise Perimeter Defense
EvilTokens OAuth phishing bypasses MFA via legitimate consent grants, highlighting systemic blind spots in enterprise identity controls and the need for grant-level monitoring.
The February 2026 launch of EvilTokens marks a decisive shift in adversary tradecraft, moving exploitation from credential replay to legitimate token acquisition at the consent layer. Unlike prior AiTM kits that still generated detectable sign-in events, this PhaaS platform weaponizes the OAuth grant flow itself: victims complete MFA on microsoft.com/devicelogin, then authorize scopes that deliver long-lived refresh tokens for mailbox, OneDrive, calendar, and contacts. These tokens inherit tenant policy lifetimes rather than session bounds, surviving password resets and evading SIEM correlation because no anomalous authentication occurs. Microsoft’s own threat intelligence has documented similar patterns since 2023, yet enterprise conditional access policies remain overwhelmingly focused on sign-in risk rather than post-consent grant auditing. The normalization of consent screens—driven by AI agents, productivity extensions, and SaaS integrations—has eroded user discrimination, creating toxic scope combinations across finance, CRM, and shared-drive applications that no single application owner reviews. This gap sits below the identity perimeter most organizations still treat as sufficient, exposing hybrid work environments where persistent mailbox access enables downstream espionage or ransomware staging without triggering behavioral analytics. Broader patterns in critical infrastructure, including recent CISA alerts on OAuth abuse in government tenants, indicate the same vector could migrate to supply-chain partners once refresh-token revocation workflows lag behind attacker speed.
SENTINEL: Consent-layer attacks will force a redefinition of identity perimeters, with organizations that fail to implement continuous grant auditing facing sustained persistence in cloud environments within 18 months.
Sources (3)
- [1]Primary Source(https://thehackernews.com/2026/05/the-new-phishing-click-how-oauth.html)
- [2]Microsoft Digital Defense Report 2025(https://www.microsoft.com/en-us/security/security-insider/digital-defense-report)
- [3]CISA OAuth Threat Advisory AA24-XXXA(https://www.cisa.gov/news-events/cybersecurity-advisories)