Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA adds Citrix Netscaler CVE-2025-5777 to KEV catalog as an active exploit target enterprise

Grok 4 appears to be consulting with Elon Musk to answer controversial questions

AWS will launch AI Agent Marketplace next week with humanity as partners

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Over 80,000 Microsoft Entra ID accounts targeted using open source team filtration tools
Identity

Over 80,000 Microsoft Entra ID accounts targeted using open source team filtration tools

userBy userJune 12, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 12, 2025Ravi LakshmananEnterprise Security/Active Directory

Open Source Team Filtration Tool

Cybersecurity researchers have discovered a new account Takeover (ATO) campaign that leverages an open source penetration testing framework called TeamFiltration that violates Microsoft Entra ID (formerly Azure Active Directory) user accounts.

The activity, codenamed UNK_SNeakyStrike by ProofPoint, has affected over 80,000 target user accounts across hundreds of organizations’ cloud tenants since a surge in login attempts was observed in December 2024, and has successfully acquired the account.

“Attackers will launch attempts to leverage Microsoft Teams APIs and Amazon Web Services (AWS) servers in various geographical regions to spray user approvals and passwords,” Enterprise Security Company said. “The attackers used access to certain resources and native applications, such as Microsoft Teams, OneDrive, and Outlook.”

Cybersecurity

TeamFiltration, published by researcher Melvin “Franvik” Langvik at the DEF CON Security Conference in August 2022, is said to be a cross-platform framework for Entra ID accounts for enumeration, spraying, exfoliation and backdooring.

The tool offers a wide range of features to promote account takeover using password spray attacks, data removal, and permanent access by uploading malicious files to the target Microsoft OneDrive account.

The tool requires an Amazon Web Services (AWS) account and a disposable Microsoft 365 account to promote password spray and account enumeration capabilities, but ProofPoint said it has leveraged these activities to observe evidence of malicious activity to leverage these activities so that each password spray wave comes from another server in a new geographical location.

Three major source regions linked to malicious activity based on the number of IP addresses include the US (42%), Ireland (11%), and the UK (8%).

Cybersecurity

UNK_SNeakyStrike activity is known as “large user enumeration and password spray attempts,” and leads to unauthorized access efforts with “high bursts” targeting multiple users within a single cloud environment. This is followed by a lull that lasts for 4-5 days.

The findings once again highlight how tools designed to assist cybersecurity experts can be misused by threat actions.

“UNK_SNeakyStrike’s targeting strategy suggests that we try to access all user accounts within a small cloud tenant, focusing only on a subset of users in the larger tenant,” ProofPoint said. “This behavior matches the advanced targeting capabilities of tools designed to exclude unwanted accounts.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFamily File Suit Challenges Arkansas Law Requiring 10 Commandments to be posted in classrooms
Next Article TFI Lodestar and Coventry University announce collaboration to celebrate Phil Watton
user
  • Website

Related Posts

CISA adds Citrix Netscaler CVE-2025-5777 to KEV catalog as an active exploit target enterprise

July 11, 2025

A critical MCP-Remote vulnerability allows remote code execution, affecting over 437,000 downloads

July 10, 2025

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

July 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA adds Citrix Netscaler CVE-2025-5777 to KEV catalog as an active exploit target enterprise

Grok 4 appears to be consulting with Elon Musk to answer controversial questions

AWS will launch AI Agent Marketplace next week with humanity as partners

Former Intel CEO starts benchmarking AI alignment

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.