Security researchers at Proofpoint have uncovered a sophisticated, ongoing campaign tracked as UNK_SneakyStrike that has leveraged the TeamFiltration pentesting framework to compromise Microsoft Entra ID user accounts at scale.
Since December 2024, this campaign has targeted more than 80,000 user accounts across hundreds of organizations, resulting in multiple confirmed account takeovers (ATOs).
The attackers have exploited access to critical Microsoft resources such as Teams, OneDrive, and Outlook, demonstrating a dangerous blurring of lines between legitimate security tools and malicious exploitation.
TeamFiltration, initially developed by a security researcher and released publicly at DefCon30 in 2021, was designed to automate common tactics, techniques, and procedures (TTPs) used in modern ATO attack chains. Its capabilities are extensive:
The attackers behind UNK_SneakyStrike have exploited these features to their full potential, utilizing AWS infrastructure across multiple regions, primarily the United States (42%), Ireland (11%), and the United Kingdom (8%), to launch their attacks.
Each password spraying wave originates from a different server, making attribution and detection more challenging.
Proofpoint’s investigation revealed several unique indicators that allowed researchers to attribute activity to TeamFiltration:
The campaign’s activity pattern is characterized by concentrated bursts of unauthorized access attempts, targeting all users in smaller tenants and a subset in larger ones, followed by quiet periods of 4–5 days.
This pattern, combined with the tool’s advanced target acquisition features, suggests a highly automated and scalable operation.
To defend against such attacks, organizations should:
The UNK_SneakyStrike campaign highlights the growing risk posed by the weaponization of legitimate security tools.
As threat actors increasingly adopt advanced frameworks like TeamFiltration, organizations must remain vigilant, leveraging both technical controls and behavioral analytics to protect their cloud environments.
Proofpoint anticipates that such attacks will continue to rise, underscoring the need for robust, adaptive security postures in the face of evolving threats.
| Indicator | Type | Description | First Seen |
| Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Teams/1.3.00.30866 Chrome/80.0.3987.165 Electron/8.5.1 Safari/537.36 | User Agent | Default user agent associated with TeamFiltration activity | – |
| 44.220.31[.]157 | IP Address | Source IP associated with UNK_SneakyStrike activity | 04/01/2025 |
| 44.206.7[.]122 | IP Address | Source IP associated with UNK_SneakyStrike activity | 07/01/2025 |
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…