Intelligence · Phishing Kit · Q1 2026
April 24, 2026Fortgale CTI14 min readRPT-26-0424
Observation of the quarter

The 2026 phishing ecosystem has outpaced traditional defenses. MFA alone is not enough. The answer is not one more product but a managed defense that combines phishing-resistant authentication, session-level detection, intelligence-driven and AI triage. An attack is not an event. It’s someone — and someone can be known, anticipated, stopped.

Key takeaways
  • MFA based on OTP, SMS and push is no longer holding. Modern phishing kits intercept the authenticated session token in real time via Adversary-in-the-Middle reverse proxies. The password is irrelevant — the token is what matters.
  • Phishing-as-a-Service has industrialized the attack. Turnkey platforms with MFA bypass, admin panel and hosting start at €200 / 2 weeks on Telegram. No technical skill required.
  • EvilTokens introduces AI-driven post-compromise automation. Chained LLMs read the mailbox via Graph API, identify financial threads and generate BEC emails in under 5 minutes, with zero human intervention.
  • The adversary persists inside Microsoft 365 without malware. The stolen token grants full access via legitimate APIs — inbox rule abuse, invoice thread scanning, BEC fraud. Endpoint protection sees nothing.
  • Only FIDO2 and passkeys resist. The cryptographic challenge is bound to the real domain and cannot be relayed through a proxy. Everything else is bypassable.
9 Phishing kits profiled Q1 2026
180+ Tracked adversaries in Fortgale CTI
~11 min Median containment
24·7·365 European SOC operation

How phishing kits bypass MFA in 2026

Most organizations still treat multi-factor authentication as the last line of defense against credential theft. The assumption is intuitive: even if the adversary obtains the password, the second factor — OTP, push, SMS — blocks access. In 2026 that assumption is dangerously outdated.

Phishing kits active today deploy Adversary-in-the-Middle (AiTM) reverse-proxy technology. Instead of a static copy of the login page, the kit inserts itself as a transparent relay between the victim and the real authentication service. The victim sees the genuine Microsoft 365, Google Workspace or banking portal. They enter the password. They complete MFA. In that instant the authenticated session token is captured — before it ever reaches the browser.

The result: the adversary walks into the tenant with a fully authenticated session. No brute-forcing. No password reuse. No MFA fatigue. Just a legitimate token, issued by your Identity Provider, now in the wrong hands.

AiTM ATTACK FLOW Victim Enters credentials + completes MFA CREDENTIALS AiTM Reverse Proxy Intercepts the token FORWARDED Microsoft 365 Issues auth token TOKEN STOLEN → FULL MAILBOX ACCESS Adversary Graph API
Critical finding

Every AiTM phishing kit analyzed in this report bypasses OTP, SMS and push. Only phishing-resistant MFA (FIDO2 / passkeys) prevents token interception, because the cryptographic challenge is bound to the legitimate domain and cannot be relayed through a proxy.

Inside Microsoft 365: the post-compromise playbook

What happens after the token is stolen is where the real damage occurs — and where most organizations are blind. The adversary does not read a few emails: they execute a precise, rehearsed sequence designed to maintain access, suppress alerts and monetize the compromise.

Phase 1
Inbox rule creation
The adversary creates rules that automatically move or delete security notifications, password reset confirmations and suspicious-login alerts. Typical actions: moveToDeletedItems, markAsRead, keyword filters on “security”, “unusual sign-in”, “password”.
Phase 2
Financial thread identification
The adversary — or an automated AI pipeline — scans the mailbox for high-value conversations: invoices, wire-transfer instructions, vendor payment threads, contracts with outstanding payments. Keywords: “bank details”, “IBAN”, “wire”, “invoice”, “payment due”.
Phase 3
BEC email generation
The adversary writes a Business Email Compromise message that replies inside the existing conversation — same tone, same formatting, same signature. New bank details are provided. The recipient has no reason to suspect.
Phase 4
Payroll redirect (targeted)
In targeted attacks (Storm-2755 style), the adversary locates HR/payroll systems accessible from the compromised account and alters direct-deposit details. Notifications are suppressed by inbox rules. The fraud may only surface at the next pay cycle.
Operational reading

No malware is installed anywhere in this chain. The attack leverages legitimate authentication tokens, legitimate APIs and the victim’s own infrastructure. Traditional endpoint protection and antivirus are completely blind.


Phishing-as-a-Service: the rental economy of cybercrime

The most alarming development of 2026 is that running these attacks no longer requires any technical skill. The criminal ecosystem has reached full industrialization under the Phishing-as-a-Service (PhaaS) model. The aspiring adversary subscribes to a Telegram-based platform, logs into a management panel, and starts operating.

These are not crude tools. PhaaS platforms ship with real-time analytics dashboards, victim tracking, token management and — in EvilTokens’ case — integrated AI that automates the entire post-compromise chain through to BEC email generation. The entry barrier for sophisticated Business Email Compromise has collapsed: from years of expertise to a Telegram subscription and a few hundred euros.

EvilProxy
€400/mo
900+ templates
Rockstar 2FA
€200/2wk
2,000+ domains
V3B PK
€200–300/mo
EU banking focus
EvilGinx2
Open source
Foundation toolkit
The economic reality
  • Cost of attack: a PhaaS subscription with MFA bypass, admin panel and hosting runs €200 to €400 per month.
  • Potential return: a single successful BEC on a wire transfer can yield six- to seven-figure sums.
  • Scalability: one affiliate runs hundreds of concurrent campaigns, tuned by season and industry.
  • Resilience: when infrastructure is taken down, the platform rotates domains and rebuilds — just like a legitimate SaaS.

The 2026 phishing kit arsenal

Based on Fortgale’s proprietary intelligence collected via Threat Intelligence Platform in Q1 2026, these are the kits operating at scale. MFA bypass is now a standard feature, not a differentiator.

Kit MFA bypass Price Signature capability Severity
EvilTokens Device Code Flow Telegram sub LLM-automated BEC Critical
EvilProxy AiTM reverse proxy €400/mo 900+ templates, TOR panel Critical
Rockstar 2FA AiTM reverse proxy €200/2wk 3,700+ URLScan hits, 2,000 domains Critical
FlowerStorm AiTM reverse proxy Telegram sub Rockstar 2FA successor (fork) Critical
EvilGinx2 AiTM reverse proxy Open source Foundation for many commercial kits High
BlackForce Man-in-the-Browser Telegram sub React-based, 9-step chain High
V3B PK Token intercept €200–300 EU banking, C2 on Telegram High
Tykit Multi-stage Telegram sub SVG delivery, Cloudflare Turnstile gate High
CoGUI / Darcula Browser profiling Telegram sub Anti-analysis fingerprinting, Chinese ops Medium

Report: EvilTokens — LLM-automated BEC

EvilTokens marks a category shift in phishing infrastructure. It is the first documented PhaaS platform to integrate large language models into the post-compromise pipeline, compressing the time between token theft and active fraud from hours to minutes.

EvilTokens PhaaS · AI-augmented

Unlike traditional AiTM kits built on reverse proxies, EvilTokens abuses the OAuth device code flow — a legitimate authentication mechanism designed for browser-less devices (smart TVs, IoT). The kit serves phishing pages impersonating Adobe, DocuSign and Microsoft, tricking the victim into authorizing a device code: the outcome is not a password but an OAuth token.

Once the token is captured, EvilTokens injects it into an automated AI pipeline: chained LLMs access the mailbox via Microsoft Graph API, analyze the content to isolate high-value financial threads, and generate contextually accurate BEC emails ready for delivery. The entire chain — from token capture to lure-ready email — completes in under 5 minutes, with zero human intervention.

EVILTOKENS ATTACK CHAIN Phishing lure Adobe / DocuSign Device Code Flow OAuth bypass Token captured Admin panel LLM pipeline Mailbox scan BEC generated Ready to send < 5 MINUTES · ZERO HUMAN INTERVENTION

Report: Rockstar 2FA and FlowerStorm

Rockstar 2FA — an evolution of the DadSec kit — and its successor FlowerStorm are the most widely deployed AiTM platforms in the wild, with thousands of detected domains and a direct lineage between them.

Rockstar 2FA alone has generated more than 3,700 URLScan hits and operates across more than 2,000 registered domains. At €200 / 2 weeks it has attracted a wide affiliate base running concurrent campaigns. When its infrastructure was disrupted in late 2025, FlowerStorm emerged as its successor — sharing significant code overlap, identical field naming conventions and architecturally close backends.

2024 DadSec Original platform 2025 Rockstar 2FA 3,700+ hits · 2K domains 2026 FlowerStorm Fork · active successor
Attribute Rockstar 2FA FlowerStorm
MFA bypass AiTM reverse proxy AiTM reverse proxy
Price €200 / 2 weeks Telegram sub
Domains 2,000+ Growing (post-Rockstar migration)
Lineage DadSec evolution Rockstar 2FA code fork
Target sectors Finance, Healthcare, IT, Telco Finance, Healthcare, Manufacturing
Hosting Bulletproof + Cloudflare Bulletproof + Cloudflare

Report: BlackForce — Man-in-the-Browser

BlackForce takes a different architectural route: instead of relaying traffic through a proxy, it operates as a Man-in-the-Browser (MitB) attack — injecting code directly into the browser session via a React application framework.

BlackForce MitB · React-based

BlackForce’s attack chain unfolds across 9 steps: a multi-stage loader progressively drops the components, evading detection by fragmenting the payload. The React frontend imitates legitimate login portals with high fidelity, while the backend exfiltrates credentials and session data in real time.

Sequence: (1) lure delivery → (2) React SPA landing → (3) browser profiling and anti-analysis → (4) MitB JavaScript injection → (5) credential capture → (6) session hijack → (7) exfiltration to C2 → (8) cookie-based persistence → (9) redirect to the legitimate site.


Keitaro TDS and Storm-2755: the phishing infrastructure

Behind every phishing campaign at scale sits infrastructure. In 2026 two elements stand out: Keitaro as the traffic management layer and Storm-2755 as a case study in end-to-end orchestration.

TRAFFIC TDS KEITARO
Keitaro TDS
Type: Traffic Distribution System  ·  Origin: repurposed commercial AdTech

Originally a legitimate AdTech product, Keitaro has been repurposed by Eastern European threat actors as the traffic management backbone for phishing operations. It provides automatic visitor routing by geolocation, browser and time of day; cloaking to hide malicious content from security crawlers; and conversion tracking to measure how many victims actually submitted credentials.

ACTOR S-2755 STORM
Storm-2755
Motivation: financial  ·  Technique: AiTM + payroll fraud

A financially motivated threat actor that combines SEO poisoning and malvertising to funnel victims to a spoofed Microsoft 365 portal. The AiTM kit captures the token, bypasses MFA, and the adversary then navigates to HR/payroll systems to reroute salaries. Inbox rules suppress notifications. No malware is used: the entire operation runs on legitimate tokens and APIs.


Operational recommendations

Based on Fortgale’s analysis of active campaigns, these are the priority defensive measures. Each line has a window and a verifiable metric.

Immediate (0–30 days)

Priority actions
  • Disable device code flow for non-privileged users in Azure AD / Entra ID — this removes the EvilTokens vector at the root.
  • Migrate critical accounts to FIDO2/passkeys — the only factor that resists AiTM interception, because the cryptographic challenge is bound to the domain.
  • Enable OAuth token monitoring with alerts on tokens issued for non-approved applications or from unexpected geographies.

Short term (30–90 days)

Hardening the operation
  • Deploy DNS filtering with proactive blocking of known PhaaS IOCs — Fortgale’s platform feeds provide continuously updated blocklists.
  • Targeted awareness on social engineering lures — these techniques rely on user-initiated execution and cannot be stopped by technical controls alone.
  • Brand monitoring for domain spoofing and malicious SEO positioning leveraging your organization’s name.

Structural

Long-term architecture
  • Session anomaly detection for IP/User-Agent mismatches on authenticated sessions — catches stolen tokens replayed from unexpected locations
  • Out-of-band verification mandatory for any bank detail or payroll change in HR systems — Storm-2755 only works if no one picks up the phone
FORTGALE · EUROPEAN MDR + SOVEREIGN THREAT INTELLIGENCE
Want to know who’s watching your sector?
The Fortgale sector report profiles by name the adversaries operating against your industry in Europe, the TTPs observed and the containment runbooks used by our senior analysts. One meeting. One NDA. One conversation with an analyst.