Summary of "I Stole a Microsoft 365 Account. Here's How."

Overview

The video is a demonstration (and instruction) of how an attacker could take over a Microsoft 365 account by combining social engineering with a tool called evilginx.

Attack premise

The creator claims they can steal a victim’s Microsoft 365 login by:

  1. Fooling the victim into visiting a phishing link.
  2. Using evilginx as a reverse proxy (man-in-the-middle) so the victim appears to authenticate with the real Microsoft domain.
  3. Bypassing MFA (from the attacker’s perspective) by capturing authentication/session artifacts (such as tokens/cookies) during the authentication flow.
  4. Later using the captured session details to gain full access to the account.

Why evilginx is central

evilginx is presented as a reverse proxy “fishing” framework that can “listen in” on the authentication session. The key emphasized capability is that:

Because the attacker captures the session artifacts after the successful login, MFA prompts do not stop the takeover once the session is captured.

Infrastructure setup

The creator walks through deploying an evilginx setup on a cloud server (using a DigitalOcean droplet) and installing the required tooling (Go, git, build steps). The process includes:

Phishing domain preparation

The video highlights creating realistic lookalike subdomains under an attacker-controlled domain (for example, domains that appear related to “OneDrive” / Microsoft branding). These subdomains are intended to match what evilginx phishlets expect.

Phishlets (configuration)

Phishlets are described as the “how-to” configuration for a specific site. A key workflow step is loading a Microsoft 365 phishlet YAML file that defines, among other things:

The creator notes that crafting phishlets is “art + science” and typically requires inspecting browser developer tools/network traffic to determine what values are needed (e.g., authenticity tokens, HTTP methods, and cookies). They also mention a ready-made phishlet ecosystem (referred to as an “evilginx mastery” ecosystem).

Operational steps in evilginx

The process shown includes:

Social engineering / lure email

The creator drafts an email impersonating a OneDrive update/security update message to a Microsoft 365 admin address in a staged tenant. The email includes the generated evilginx lure URL and is intended to get the victim to click and then enter credentials.

Demonstrated takeover flow (end-to-end)

  1. The victim clicks the phishing link and sees a Microsoft OneDrive login page.
  2. The victim enters username/password into what appears to be the real Microsoft login page.
  3. The victim completes MFA (approves on their phone).
  4. evilginx detects successful authorization, intercepts the authorization URL/token, and captures the session cookie(s).
  5. The attacker imports those cookies into a cookie editor and accesses office.com, effectively logging into the full Microsoft 365 account without re-entering credentials.

Outcome / claim

The video concludes that the method enables “stolen Microsoft 365 account” access by combining:

Presenters / contributors

Category ?

News and Commentary


Share this summary


Is the summary off?

If you think the summary is inaccurate, you can reprocess it with the latest model.

Video