Bg Shape
Image

MFA Bypass Attacks Rise as New Threats Emerge

Robert Kehoe
Chief Technology Officer
Published:
April 1, 2026

A few themes are starting to show up again this week, and none of them are particularly comforting. Access is getting easier for attackers, coordination is getting messier, and some very familiar systems are still leaving doors open.

The result is the same as always, just faster and at a bigger scale.

Phishing-as-a-Service: Evil Tokens

There’s a new phishing-as-a-service platform doing the rounds called Evil Tokens, and it’s already hit over 340 organisations. What makes this one stand out is how it bypasses MFA. Instead of going after passwords directly, it targets Microsoft OAuth device code flows and hijacks tokens that can survive even after a password reset. So even if you think you’ve contained the issue, the attacker may still have access.

It’s being distributed through a Telegram subscription model, which means you don’t need to be particularly skilled to use it. That’s the real problem here. The barrier to entry keeps dropping.

What to do:
Start with your Entra ID logs. Look for unusual sign-ins, especially anything tied to railway.com IPs. Revoke suspicious refresh tokens immediately. If you’re not actively using OAuth device code flows, block them outright through conditional access.

Geopolitical Spillover: Iranian-Linked Activity

There’s been a noticeable spike in activity linked to pro-Iranian groups. Palo Alto Unit 42 tracked over 7,300 phishing URLs themed around ongoing conflicts. This isn’t just phishing for the sake of it. These campaigns are tied into broader activity including wiper attacks, DDoS operations, and credential harvesting targeting Western infrastructure.

What makes this more unpredictable is the current environment. With Iran experiencing near-total internet disruption, a lot of this activity is becoming more decentralised. Less control, more aggression, wider targeting.

What to do:
If you’re in sectors like healthcare, logistics, or financial services, now’s the time to revisit your business continuity plans. Make sure staff are aware of conflict-themed phishing lures. These campaigns rely heavily on urgency and emotional triggers.

Critical Vulnerability: Magento / Adobe Commerce

There’s also a serious issue affecting Magento and Adobe Commerce, being referred to as Polyshell.

This one allows unauthenticated attackers to upload malicious files disguised as images, leading to full remote code execution. No login required, which is always a bad sign. It’s already being used to extract credit card data from compromised sites.

The catch? There’s no official patch yet. There is a community patch available, but that means organisations need to be proactive rather than waiting for a formal release.

What to do:
If you’re running Magento or Adobe Commerce, you need to assess exposure immediately. Apply the available community patch and monitor closely for suspicious activity, especially around file uploads and payment data access.

Closing Thoughts

Nothing here is especially new in isolation. Phishing, geopolitical campaigns, vulnerable software. We’ve seen all of it before. What’s changed is how easy it is to scale these attacks and how quickly they can move once they get in.

Access is still the main objective. Whether that’s through tokens, users, or exposed systems, once it’s there, everything else becomes easier.

Staying ahead of this isn’t about reacting faster. It’s about tightening the basics so there’s less to exploit in the first place.

Read Our Latest Blogs

Blog Image
Iran Cyber Activity Focuses on Industrial Systems and Data Leaks

Iran-linked cyber activity targets industrial systems, data leaks, and human vulnerabilities, with risk centred on access, exposure, and operational control

Blog Image
North Korean Supply Chain Attacks, Chrome Zero-Day Exploit, and Qilin EDR Bypass

An in-depth look at major cybersecurity threats including North Korean supply chain compromises, a critical Chrome zero-day exploit, and Qilin ransomware

Blog Image
Claude Mythos: What Security Leaders Should Take Away

AI models like Claude Mythos are accelerating vulnerability discovery and exploitation, compressing attack timelines and increasing pressure on defenders.

Bg ShapeBg Shape
BLOGS & INSIGHTS

MFA Bypass Attacks Rise as New Threats Emerge

Cybersecurity Insights
Robert Kehoe
Chief Technology Officer
April 1, 2026

A few themes are starting to show up again this week, and none of them are particularly comforting. Access is getting easier for attackers, coordination is getting messier, and some very familiar systems are still leaving doors open.

The result is the same as always, just faster and at a bigger scale.

Phishing-as-a-Service: Evil Tokens

There’s a new phishing-as-a-service platform doing the rounds called Evil Tokens, and it’s already hit over 340 organisations. What makes this one stand out is how it bypasses MFA. Instead of going after passwords directly, it targets Microsoft OAuth device code flows and hijacks tokens that can survive even after a password reset. So even if you think you’ve contained the issue, the attacker may still have access.

It’s being distributed through a Telegram subscription model, which means you don’t need to be particularly skilled to use it. That’s the real problem here. The barrier to entry keeps dropping.

What to do:
Start with your Entra ID logs. Look for unusual sign-ins, especially anything tied to railway.com IPs. Revoke suspicious refresh tokens immediately. If you’re not actively using OAuth device code flows, block them outright through conditional access.

Geopolitical Spillover: Iranian-Linked Activity

There’s been a noticeable spike in activity linked to pro-Iranian groups. Palo Alto Unit 42 tracked over 7,300 phishing URLs themed around ongoing conflicts. This isn’t just phishing for the sake of it. These campaigns are tied into broader activity including wiper attacks, DDoS operations, and credential harvesting targeting Western infrastructure.

What makes this more unpredictable is the current environment. With Iran experiencing near-total internet disruption, a lot of this activity is becoming more decentralised. Less control, more aggression, wider targeting.

What to do:
If you’re in sectors like healthcare, logistics, or financial services, now’s the time to revisit your business continuity plans. Make sure staff are aware of conflict-themed phishing lures. These campaigns rely heavily on urgency and emotional triggers.

Critical Vulnerability: Magento / Adobe Commerce

There’s also a serious issue affecting Magento and Adobe Commerce, being referred to as Polyshell.

This one allows unauthenticated attackers to upload malicious files disguised as images, leading to full remote code execution. No login required, which is always a bad sign. It’s already being used to extract credit card data from compromised sites.

The catch? There’s no official patch yet. There is a community patch available, but that means organisations need to be proactive rather than waiting for a formal release.

What to do:
If you’re running Magento or Adobe Commerce, you need to assess exposure immediately. Apply the available community patch and monitor closely for suspicious activity, especially around file uploads and payment data access.

Closing Thoughts

Nothing here is especially new in isolation. Phishing, geopolitical campaigns, vulnerable software. We’ve seen all of it before. What’s changed is how easy it is to scale these attacks and how quickly they can move once they get in.

Access is still the main objective. Whether that’s through tokens, users, or exposed systems, once it’s there, everything else becomes easier.

Staying ahead of this isn’t about reacting faster. It’s about tightening the basics so there’s less to exploit in the first place.

Robert Kehoe

Chief Technology Officer

Robert is CTO at Smarttech247, leading engineering strategy and delivery across cybersecurity products and services. With over 15 years’ experience in software and security, and CISSP certified, he has led large-scale cloud and security initiatives, including Cloud Protection for Salesforce. Robert focuses on measurable customer outcomes and building empowered, high-performing engineering teams.

Contents:

Ready to scale your security and compliance operations?

We protect your on-premise/cloud/OT environments - 24x7x365