According to a recent LinkedIn post from Huntress, the company is drawing attention to an alleged large‑scale phishing operation dubbed EvilTokens that it says took place in February 2026. The post describes a scenario in which attackers reportedly used AI‑generated phishing lures, legitimate Microsoft authentication flows, and infrastructure on mainstream cloud platforms such as AWS and Cloudflare to harvest access tokens at scale.
Claim 55% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
The post promotes a live event scheduled for May 5 featuring a Huntress representative and a guest from Microsoft Threat Intelligence to discuss technical details of the incident, its effectiveness, and possible defensive measures. For investors, this emphasis on emerging threat vectors and collaboration with a major ecosystem partner like Microsoft suggests that Huntress is positioning its brand as a specialist in detecting sophisticated, cloud‑ and AI‑enabled attacks.
If the described techniques become more prevalent, demand for advanced managed detection and response services could increase, potentially supporting Huntress’s long‑term growth prospects. The focus on education and incident analysis may also help deepen relationships with enterprise security teams, which could translate into improved customer retention and cross‑sell opportunities in a competitive cybersecurity market.

