Preventing AiTM Attacks and Stopping Token Theft with Microsoft E5

TLDR: skip to the summary at the bottom for quick wins with AiTM.

Adversary-in-the-Middle (AiTM) phishing targets the authenticated session token that exists after a user has already completed multi-factor authentication. Once captured, that token gives an attacker full access to M365 services — email, SharePoint, Teams, OneDrive — without ever knowing the user’s password, and without triggering another MFA prompt.

The March 2026 EvilTokens / Railway.com campaign, documented by Huntress across more than 340 organisations, introduced a variant that bypasses even network-based session controls: rather than routing a victim through a reverse proxy, it abuses the OAuth device code flow — a legitimate Microsoft authentication mechanism — to harvest tokens directly, then uses those tokens to register a device in Entra ID and obtain a Primary Refresh Token (PRT).

01
01 /

The Threat Landscape

The Core Problem

Multi-factor authentication stops password replay. It does not stop token theft. Adversary-in-the-Middle attacks intercept the authenticated session token after MFA succeeds — then replay it from the attacker’s infrastructure. The user sees nothing unusual. No failed MFA prompt. No alert. A stolen access token gives full M365 access for hours; a stolen refresh token survives a password reset for days.

Every token theft attack follows the same four-phase progression. Understanding each phase is the starting point for mapping the right controls.

01
Lure & Redirect
Targeted phishing email delivers a link that routes the victim through an attacker-controlled proxy or device code flow. Highly convincing — Microsoft-branded pages, valid TLS certificates.
02
Token Interception
The proxy relays credentials and MFA to Microsoft in real-time, receives the authenticated session cookie, and forwards a clean login experience to the victim. MFA was completed — by the proxy.
03
Persistence & Pivot
Attacker replays the access token immediately. Uses the refresh token to register a device, obtain a Primary Refresh Token (PRT), and achieve persistent silent access — surviving password resets.
04
Impact
Business email compromise (inbox rules, forwarding), data exfiltration, lateral movement to on-premises systems via hybrid join, financial fraud. Average dwell time before detection: 3–7 days.
LURE
Phishing email + proxy redirect
INTERCEPT
Proxy relays MFA to Microsoft
TOKEN HARVEST
Session cookie + refresh token stolen
PERSISTENCE
Device reg + PRT survives pwd reset
IMPACT
BEC / Exfil / Lateral move
02
02 /

Attacker Arsenal

These are the active frameworks and phishing-as-a-service platforms observed in the wild. Knowing what attackers are using — and how each tool works — determines which controls are non-negotiable versus layered defences.

Evilginx2 / AiTM Proxy
Open Source
Open-source reverse proxy with automatic session cookie extraction. Widely documented; the reference implementation attackers adapt from. Targets any web-based SSO flow.
EvilProxy / PhaaS
Phishing-as-a-Service
Subscription-based phishing-as-a-service. Targets Apple, Google, Microsoft, and 50+ providers. Operator dashboard, ready-made lure pages. Low technical barrier for attackers.
EvilTokens / Railway.com / Device Code
March 2026 Campaign
March 2026 Huntress-documented campaign. Uses OAuth device code phishing instead of AiTM proxy — bypasses GSA network checks entirely. Chains into device registration + PRT for persistent access.
Storm-1167 / PhaaS
Microsoft-Tracked Actor
Microsoft-tracked threat actor operating a multi-stage indirect proxy AiTM service. Targets financial services and professional services sectors. Known to automate BEC follow-on within minutes of token capture.
Modlishka / AiTM Proxy
Open Source
Polish-origin open-source AiTM tool. Single-binary, no external dependencies. Often deployed on compromised servers or cloud VMs. Targets standard browser auth flows.
Caffeine / PhaaS
Phishing-as-a-Service
PhaaS platform — notable for open self-registration (no referral required). Focuses on Microsoft 365 targets. Provides anti-bot and anti-analysis evasion, geo-fencing, and victim tracking dashboards.
03
03 /

The Modern Attack Chain

Why This Matters Now

Classic AiTM proxy attacks are increasingly blocked by Global Secure Access Strict Enforcement Mode — which validates the client IP against a Microsoft-managed Entra network presence. Attackers adapted: the EvilTokens / Railway.com campaign (March 2026) uses the OAuth device authorization flow instead of a reverse proxy. The user enters a code on a legitimate Microsoft page — no proxy involved. GSA network checks never fire. The stolen refresh token is then used to register a device under the attacker’s control, obtain a Primary Refresh Token (PRT), and achieve silent, persistent access to all M365 services — even after the user changes their password.

Attack Chain — Device Code Phishing & PRT Pivot

The kill chain below shows how an attacker converts a single phishing email into persistent, password-reset-proof access to all M365 services — without ever touching a reverse proxy.

1. PHISHING EMAIL
Attacker sends device code link
2. DEVICE CODE
User enters code at microsoft.com ✓
3. TOKEN ISSUED
Attacker receives refresh token
4. DEVICE REGISTER
Rogue device joins Entra ID
5. PERSISTENT
PRT = silent SSO to all M365 services
KEY DIFFERENCE VS CLASSIC AiTM — No reverse proxy used. User authenticates on legitimate Microsoft page. GSA network enforcement does not fire. CA device code block is the primary control.
Why the PRT Is the Real Target

A Primary Refresh Token (PRT) is a long-lived credential that provides silent single-sign-on to every Microsoft 365 service. It is normally bound to a managed device. When an attacker registers a device using a stolen refresh token and obtains a PRT, they inherit that persistent SSO capability — with no MFA prompt, on their own hardware. A PRT survives a password reset because it is tied to the device registration, not the password. Revoking it requires removing the rogue device registration from Entra ID.

04
04 /

The Token Map: What an Attacker Sees First

The Local Admin Problem

An adversary who gains local administrator access to a managed Mac or Windows endpoint does not need to phish credentials. Every browser cookie database, every MSAL token cache, and — on Windows — LSASS memory itself contain active, replay-capable Microsoft 365 credentials. A tool like M365 Token Inspector (token_inspector.py) maps exactly what is present. The result on a corporate machine is reliably alarming.

Running streamlit run token_inspector.py on an active corporate Mac surfaces every Microsoft authentication token across Firefox, Chrome, and Edge simultaneously. Firefox cookies are stored in plaintext SQLite databases — no decryption required. Chrome and Edge cookies are AES-128-CBC encrypted with a key held in macOS Keychain. Retrieving that key requires one Keychain prompt — which an attacker with local admin can trigger silently via a background process. The output is a categorised inventory of every live credential: its expiry window, its host domain, and its classification. On a typical corporate Mac with an active M365 session, expect between 30 and 80 Microsoft cookies — several of them Critical.

Token / Cookie Storage Lifetime Risk What an Attacker Does With It
estsauthpersistent Browser cookie store (disk) Up to 90 days Critical Replays the full Entra ID authenticated session from any remote host. Grants access to email, Teams, SharePoint, and OneDrive. No MFA prompt fires. No new sign-in event is logged for the replay — it appears as a continuation of the original session.
sccauth / sccauthc1 Browser memory / cookie store Session Critical Accesses the Microsoft Defender XDR portal (security.microsoft.com). Attacker can suppress active alerts, close incidents, add AV/EDR exclusions for their tools, and disable MDE sensor policies — blinding the security team while access continues undetected.
fedauth / rtfa Browser cookie store (disk) Session / persistent Critical Grants full SharePoint farm access — read, modify, exfiltrate, or delete documents and files across all SharePoint sites and OneDrive. Access patterns are indistinguishable from normal user activity in SharePoint audit logs.
MSAL Refresh Token Disk (DPAPI / Keychain encrypted) 90 days (sliding) Critical Survives a password reset. Exchangeable for new access tokens to any M365 service indefinitely within the 90-day window. On Windows, extractable via SharpDPAPI or Mimikatz DPAPI module with local admin. The user’s password change does not touch this token.
Primary Refresh Token (PRT) Windows LSASS / macOS Keychain 14 days (auto-renewed) Critical Silent SSO to every M365 service. On Windows, extracted from LSASS memory using ProcDump or Mimikatz, then used with AADInternals to generate access tokens for any M365 resource — no MFA, no password, from any attacker-controlled device.
ohpauth / ohpauthc1 Browser cookie store Session Critical Full Microsoft 365 portal access. Used to pivot to connected apps, access shared mailboxes, modify user settings, enumerate tenant resources, and exfiltrate data from any service the user can reach via the portal.
estsauth (non-persistent) Browser memory Browser session High Short-lived but immediately replayable while the browser is open. Usable for rapid exfiltration tasks — forwarding email rules, downloading OneDrive contents, accessing Teams messages — before the session closes.
High-Risk Observation — The 90-Day Replay Window

The estsauthpersistent cookie is created whenever a user selects “Keep me signed in” at the Entra login prompt — the default on most corporate Macs. An attacker who extracts this single cookie value from the browser’s SQLite database can inject it into any browser and access all M365 services for up to 90 days. There is no re-authentication prompt, no MFA challenge, and no new sign-in event generated in Entra ID logs. The session presents with the user’s original IP context from initial login, making anomaly detection unreliable unless the replay occurs from a geographically distant IP or unfamiliar ASN.

High-Risk Observation — Going Dark With sccauth

The sccauth cookie is the most underappreciated Critical token on the list. It grants access to the Microsoft Defender XDR portal. An attacker who captures it can suppress active detections, close open incidents, add their tools to MDE exclusion lists, and offboard endpoints from Defender monitoring — all from the same portal the security team uses to investigate them. This is how attackers go dark inside a defended environment: not by evading detection initially, but by accessing the security controls themselves and disabling them after they are already inside. A compromised sccauth session will not generate a suspicious sign-in alert, because it looks like an analyst using their own tools.

High-Risk Observation — Password Reset Does Nothing for Refresh Tokens

MSAL refresh tokens persist in an encrypted file on disk and survive a password reset by design — the token lifecycle is managed by Entra ID server-side policy, not the password. When incident response advises a user to change their password after a compromise, that action alone invalidates nothing an attacker has already captured from the MSAL cache. Revocation requires an explicit server-side action: Revoke-AzureADUserAllRefreshToken via PowerShell, or the “Sign out everywhere” option in myaccount.microsoft.com. Until that is executed, the attacker continues to generate valid access tokens from their captured refresh token.

Attack Chain 1 — Local Admin to Full M365 Compromise

1. LOCAL ADMIN
Endpoint access gained (any method)
2. TOKEN SCAN
Browser DBs · MSAL cache · LSASS (Win)
3. CRITICAL TOKENS
estsauthpersistent · sccauth · fedauth · PRT
4. REMOTE REPLAY
Cookies injected into attacker browser / C2
5. FULL M365
Email · Teams · SP · No MFA · 90-day window
NO PHISHING REQUIRED — Local admin = full token access. No credentials stolen, no MFA bypassed — the tokens already exist on disk and in memory from the user’s normal session.

Attack Chain 2 — Covering Tracks via the Defender Portal (sccauth)

1. sccauth CAPTURED
Defender portal session replayed
2. ALERT SUPPRESSION
Active incidents closed, alerts resolved / hidden
3. AV EXCLUSIONS
Attacker tools added to MDE exclusion list
4. SENSOR DISABLED
Endpoint offboarded from MDE policy
5. SOC IS BLIND
Zero telemetry. Attacker operates freely.
THE UNDERAPPRECIATED RISK — sccauth is not a data access token — it is a security control access token. An attacker who uses it to disable monitoring can then operate for weeks without triggering a single alert.
05
05 /

Attack Scenarios & E5 Controls

Each card maps a specific attack scenario to the Microsoft E5 controls that stop it — covering the problem, the solution, and the licensing required. Use these to drive the conversation with your customer around their current gaps.

SCENARIO 01 AiTM Proxy — Session Token Theft Token Theft
Problem
Reverse proxy intercepts the post-MFA session cookie. Attacker replays the token from a foreign IP address. Standard MFA does not prevent replay. Token valid for hours with no further challenge.
E5 Controls
Global Secure Access + Strict Enforcement — binds sessions to a Microsoft-managed network presence. Token replayed from an external IP is rejected immediately.
Continuous Access Evaluation (CAE) — re-evaluates session on every API call. IP-change or policy violation revokes access in under 15 minutes.
Entra ID Protection — anomalous token risk signal triggers risk-based CA auto-block on the compromised session.
SCENARIO 02 Device Code Phishing — OAuth Flow Abuse Dev Code
Problem
Attacker initiates a device code flow, sends the code to the victim. Victim enters code at microsoft.com — a legitimate Microsoft page. Attacker receives access and refresh tokens with no proxy involvement. GSA network enforcement does not fire.
E5 Controls
CA — Block Device Code Flow — CA policy denying the device_code grant for all users except approved device-constrained roles.
Entra ID Protection — Anomalous Token Risk — device code abuse triggers a risk signal; risk-based CA auto-blocks the session.
Defender XDR — correlates the device code grant event with subsequent anomalous M365 activity into a single incident.
SCENARIO 03 Device Registration + PRT Pivot PRT Abuse
Problem
Attacker uses a stolen refresh token to register a device in Entra ID and request a Primary Refresh Token. The PRT grants silent SSO to all M365 services from the attacker’s own hardware — with no MFA required and no revocation on password reset.
E5 Controls
MFA for Device Registration — Entra CA policy forces MFA at join time, preventing registration using only a stolen refresh token.
Token Protection (Proof-of-Possession) — cryptographically binds the token to the originating device. A stolen token cannot be replayed on a different device.
Restrict User-Initiated Device Registration — limit registration to Intune-enrolled managed devices.
Defender XDR — Anomalous Device Registration Alert — detection fires when a device is registered from a non-corporate IP or following a suspicious token event.
SCENARIO 04 Refresh Token Persistence After Password Reset Persistence
Problem
A refresh token remains valid after a password reset unless explicitly revoked. Attackers who captured a refresh token before the reset retain full access — including the ability to request new access tokens indefinitely. Users and admins believe the reset resolved the breach.
E5 Controls
Revoke All Refresh Tokens — Revoke-AzureADUserAllRefreshToken invalidates all active sessions across every device and app immediately.
Risk-Based CA Auto-Revocation — Entra ID Protection high-risk user flag triggers automatic token revocation without manual intervention.
Defender XDR Attack Disruption — automatically contains the compromised account and suspends active sessions upon high-confidence attack detection.
SCENARIO 05 OAuth App Consent Abuse App Abuse
Problem
Attacker tricks the user into consenting to a malicious OAuth application. The app receives delegated permissions tied to the user’s identity — persisting even after password reset or token revocation, until the app consent itself is removed.
E5 Controls
Restrict User Consent — CA policy requires admin approval for all third-party OAuth app consent.
Admin Consent Workflow — Entra ID admin consent request workflow routes app approvals to designated reviewers.
Defender for Cloud Apps — OAuth app anomaly detection flags apps with suspicious permission sets, unusual publisher domains, or consent patterns inconsistent with legitimate software.
SCENARIO 06 BEC — Inbox Rule Hijack Post-Compromise
Problem
Attacker with mailbox access creates forwarding rules or auto-delete rules to hide their activity and intercept financial communications. Rules persist even after the stolen session is revoked.
E5 Controls
Defender for Cloud Apps — Inbox Rule Anomaly — built-in policy fires when a rule is created that forwards or deletes email matching financial keywords or external domains.
Defender XDR Auto-Disruption — automatically disables the compromised account and quarantines suspicious mail rules upon high-confidence BEC detection.
Exchange Online Audit Logging — unified audit log captures every inbox rule creation/modification.
SCENARIO 07 PaaS Infrastructure & IP Rotation Evasion Evasion
Problem
Attackers host phishing infrastructure on legitimate PaaS platforms (Railway, Vercel, Cloudflare Workers) to evade IP blocklists. They rotate IPs rapidly, making traditional IP-reputation controls ineffective.
E5 Controls
GSA Strict Enforcement Mode — validates sessions against the Entra network presence, not IP reputation. PaaS IP rotation is irrelevant.
Entra ID Protection — Behavioral Signals — evaluates impossible travel, unfamiliar location, and token properties holistically.
Defender XDR Advanced Hunting — custom KQL detects sign-ins from hosting provider ASNs combined with anomalous M365 activity.
06
06 /

Defense Architecture

PREVENT
Passkeys · Token Binding · Block Device Code
ENFORCE
GSA Strict Mode · CAE · Compliant Device CA
DETECT
ID Protection · XDR · Sentinel KQL
RESPOND
Auto-Disruption · Token Revocation
Layer 1 — Prevent
Make Tokens Worthless
Controls that ensure captured tokens cannot be replayed or bound to attacker devices
FIDO2 Passkeys
Token Protection
Block Device Code
Device Reg MFA
FIDO2 Passkeys: Phishing-resistant credential — no password to intercept, no OTP to relay. Immune to AiTM by design.
Token Protection: Proof-of-possession cryptographically binds the access token to the issuing device. Replay on any other device fails at validation.
Block Device Code: Conditional Access policy denies the device code grant type for all non-approved roles. Closes the EvilTokens attack path entirely.
Device Reg MFA: CA policy requires phishing-resistant MFA at device registration time. Stolen refresh tokens cannot be used to register rogue devices.
Layer 2 — Enforce
Block Replay in Real-Time
Network and session enforcement that rejects stolen tokens at use
GSA + Strict Mode
CAE
Compliant Device CA
GSA + Strict Mode: Global Secure Access anchors every Entra-protected session to a Microsoft-managed network presence. Token replayed from an external IP is rejected. Entra Suite add-on.
CAE: Continuous Access Evaluation pushes real-time policy signals to resource providers. IP change or risk elevation revokes access in under 15 minutes.
Compliant Device CA: Conditional Access requires Intune device compliance on all M365 sessions. Attacker-registered non-managed devices fail the compliance check.
Layer 3 — Detect & Respond
Catch What Slips Through
Signal correlation and automated containment for attacks in progress
ID Protection
Defender XDR
Defender for Cloud Apps
Sentinel
ID Protection: Risk-based signals (anomalous token, impossible travel, unfamiliar location) auto-block the session via CA. No analyst required.
Defender XDR: Correlates identity, endpoint, email, and cloud signals into a single incident. Auto-disruption suspends compromised accounts on high-confidence detection.
Defender for Cloud Apps: Inbox rule anomalies, OAuth app abuse, impossible travel across SaaS services — all correlated with Entra sign-in context.
Sentinel: Custom KQL analytics rules for device code grants, anomalous device registrations, and PaaS ASN sign-ins. Playbook automation for incident response.
07
07 /

Detection & Response

Prevention controls reduce exposure but will not catch every attack. The following Microsoft tools provide the detection and automated response capability needed to identify active token theft and contain it before data is exfiltrated.

Entra ID Protection
Identity Risk
Anomalous Token
flags tokens with unusual IP, device, or session properties
Impossible Travel
detects sign-ins from geographically impossible locations within a session window
Risk-Based CA
auto-blocks or requires step-up auth on Medium/High risk without analyst action
Microsoft Defender XDR
Cross-Signal Correlation · Auto-Disruption
Cross-Workload Incident
stitches identity, endpoint, email, and cloud signals into one unified incident
Automatic Attack Disruption
suspends compromised user account and active sessions upon high-confidence AiTM classification
AiTM Detection
native classifier identifies session cookie replay patterns across Entra sign-in telemetry
Defender for Cloud Apps
SaaS & Cloud Activity
Inbox Rule Anomaly
built-in policy fires on forwarding or deletion rules targeting financial keywords or external addresses
OAuth App Governance
flags apps with over-privileged permissions or abnormal consent patterns
Impossible Travel (SaaS)
extends identity-level impossible travel detection across cloud app activity
Defender for Identity
Hybrid / On-Premises
Lateral Movement
detects pass-the-hash, pass-the-ticket, and Kerberos abuse following cloud identity compromise
Privilege Escalation
flags DCSync, AdminSDHolder modification, and AD group changes inconsistent with user role
Hybrid Correlation
links on-premises AD events to Entra cloud identity signals for unified hybrid attack view in XDR
KQL — Detect Device Code Grant Sign-Ins (Sentinel / SigninLogs)
SigninLogs | where AuthenticationProtocol == "deviceCode" | where ResultType == 0 // successful only | project TimeGenerated, UserPrincipalName, IPAddress, AppDisplayName, DeviceDetail, Location | order by TimeGenerated desc
KQL — Anomalous Device Registration Following Suspicious Sign-In
let riskySignins = SigninLogs | where RiskLevelDuringSignIn in ("high","medium") | project UserPrincipalName, riskTime = TimeGenerated; AuditLogs | where OperationName == "Register device" | extend UPN = tostring(InitiatedBy.user.userPrincipalName) | join kind=inner riskySignins on $left.UPN == $right.UserPrincipalName | where TimeGenerated between (riskTime .. riskTime + 4h) | project TimeGenerated, UPN, DeviceName = tostring(TargetResources[0].displayName)
KQL — Inbox Forwarding Rules Created to External Addresses
OfficeActivity | where Operation in ("New-InboxRule","Set-InboxRule") | where Parameters has "ForwardTo" or Parameters has "RedirectTo" | extend RuleParams = parse_json(Parameters) | where RuleParams has_any ("@gmail","@yahoo","@outlook.com") or RuleParams !has "@yourdomain.com" | project TimeGenerated, UserId, ClientIP, Parameters
08
08 /

MITRE ATT&CK Coverage

The table below maps each technique used across the token theft attack chain to its MITRE ATT&CK identifier and the corresponding E5 mitigations. This provides a common framework for discussing coverage with security-aware customers.

Technique ID Name Phase E5 Mitigations
T1566.002 Phishing: Spear-phishing Link Initial Access Defender for Office 365 Safe Links; user awareness training
T1539 Steal Web Session Cookie Credential Access GSA Strict Enforcement; Token Protection; CAE revocation
T1550.001 Use Alternate Authentication Material: Application Access Token Defense Evasion / Lateral Movement Token Protection; CAE; Entra ID Protection Anomalous Token signal
T1528 Steal Application Access Token (OAuth device code) Credential Access CA policy blocking device code grant; Defender XDR detection
T1098.005 Account Manipulation: Device Registration Persistence MFA at device registration; Restrict BYOD registration; Anomalous device reg alert
T1556.006 Modify Authentication Process: Multi-Factor Authentication Defense Evasion Privileged Identity Management; MFA method audit; Defender XDR MFA change detection
T1114.003 Email Collection: Email Forwarding Rule Collection Defender for Cloud Apps inbox rule anomaly; Exchange audit logging KQL
T1078.004 Valid Accounts: Cloud Accounts Persistence / Privilege Escalation Risk-based CA auto-block; Defender XDR auto-disruption; refresh token revocation
T1136.003 Create Account: Cloud Account Persistence Entra Privileged Identity Management; admin account audit; creation anomaly alert
Licensing

All controls above are available within Microsoft 365 E5 or the Microsoft 365 E5 Security add-on, with one exception: Global Secure Access (GSA) is part of the Microsoft Entra Suite, which is a separate add-on (~$12 USD/user/month). GSA provides the strongest single control against token replay. All monitoring tools (Defender XDR, Defender for Cloud Apps, Defender for Identity, Sentinel, Entra ID Protection) are included in M365 E5.

Summary /

Key Takeaways & Recommended Actions

The controls below represent the highest-impact actions for closing the token theft exposure window. Prioritise by threat coverage and implementation effort — the first three can be deployed with a single Conditional Access policy each.

Summary Recommended Control Priorities
Control
Covers
Priority
Eliminates the EvilTokens / OAuth device code phishing path entirely. Single CA policy, low complexity, no user impact in most organisations.
Critical
Prevents PRT pivot via stolen refresh token. Blocks the persistent access phase even when token theft has already occurred.
Critical
Automatically blocks or step-up challenges sessions flagged as anomalous — covers token replay, impossible travel, and unfamiliar sign-in properties without manual intervention.
Critical
Strongest control against classic AiTM proxy token replay. Binds every session to Microsoft-managed network presence. Requires Entra Suite add-on.
High
Cryptographically binds access tokens to the issuing device. Prevents replay on any other hardware. Currently Windows + Exchange/SharePoint only.
High
The only MFA method fully immune to AiTM by design. Prioritise for privileged accounts, finance teams, and executives — highest-value targets for token theft campaigns.
High
Provides detection coverage for attacks that bypass preventive controls. Device code grants, anomalous device registrations, and inbox rule creation should all have active analytics rules.
Medium
David Broggy | LevelBlue — April 2026