Cyber News

Exploiting TeamFiltration – Hackers Breach Microsoft Services via Pentesting Framework

Security researchers at Proofpoint have uncovered a sophisticated, ongoing campaign tracked as UNK_SneakyStrike that has leveraged the TeamFiltration pentesting framework to compromise Microsoft Entra ID user accounts at scale.

Since December 2024, this campaign has targeted more than 80,000 user accounts across hundreds of organizations, resulting in multiple confirmed account takeovers (ATOs).

The attackers have exploited access to critical Microsoft resources such as Teams, OneDrive, and Outlook, demonstrating a dangerous blurring of lines between legitimate security tools and malicious exploitation.

Weaponizing a Pentesting Tool

TeamFiltration, initially developed by a security researcher and released publicly at DefCon30 in 2021, was designed to automate common tactics, techniques, and procedures (TTPs) used in modern ATO attack chains. Its capabilities are extensive:

  • Account Enumeration: The tool uses a “sacrificial” Office 365 Business Basic account and the Microsoft Teams API to verify the existence of user accounts within a target environment. Recent updates have added OneDrive-based enumeration, further expanding its reach.
  • Password Spraying: TeamFiltration systematically attempts to compromise accounts using common or algorithmically varied passwords, rotating through different AWS regions to evade detection.
  • Data Exfiltration: Once access is gained, the tool enables attackers to extract emails, files, and other sensitive data.
  • Persistence via OneDrive: By uploading malicious files to a victim’s OneDrive and replacing existing desktop files with lookalikes, attackers can establish persistent access and potentially enable lateral movement within the network.

The attackers behind UNK_SneakyStrike have exploited these features to their full potential, utilizing AWS infrastructure across multiple regions, primarily the United States (42%), Ireland (11%), and the United Kingdom (8%), to launch their attacks.

Each password spraying wave originates from a different server, making attribution and detection more challenging.

Campaign Tactics and Attribution

Proofpoint’s investigation revealed several unique indicators that allowed researchers to attribute activity to TeamFiltration:

  • Distinctive User Agent: The default user agent associated with TeamFiltration is rarely observed in legitimate environments. Its appearance in logs correlated strongly with malicious activity.
  • Spoofed Application Access: Researchers observed attempted access to specific sign-in applications from devices incompatible with those applications, indicating user agent spoofing and obfuscation.
  • Client ID Anomalies: TeamFiltration’s configuration includes a list of client application IDs, some of which are incorrect (e.g., ‘Outlook’ and ‘OneNote’ IDs actually correspond to ‘Microsoft Office’ and ‘OneDrive SyncEngine’). These anomalies, likely due to an outdated snapshot from the Secureworks FOCI research repository, provided another strong indicator of attribution.
Execution flow of TeamFiltration, as displayed on GitHub (github.com/Flangvik/TeamFiltration).

The campaign’s activity pattern is characterized by concentrated bursts of unauthorized access attempts, targeting all users in smaller tenants and a subset in larger ones, followed by quiet periods of 4–5 days.

This pattern, combined with the tool’s advanced target acquisition features, suggests a highly automated and scalable operation.

Defense and Detection Recommendations

To defend against such attacks, organizations should:

  • Monitor authentication logs for the distinctive TeamFiltration user agent and known AWS IP addresses (e.g., 44.220.31.157, 44.206.7.122, 3.255.18.223).
  • Implement conditional access policies to block legacy authentication and require multi-factor authentication (MFA).
  • Audit sign-ins for mismatched device/application combinations and monitor for token reuse.
  • Correlate behavioral analytics with threat intelligence to distinguish between legitimate penetration testing and real-world malicious activity.

The UNK_SneakyStrike campaign highlights the growing risk posed by the weaponization of legitimate security tools.

As threat actors increasingly adopt advanced frameworks like TeamFiltration, organizations must remain vigilant, leveraging both technical controls and behavioral analytics to protect their cloud environments.

Proofpoint anticipates that such attacks will continue to rise, underscoring the need for robust, adaptive security postures in the face of evolving threats.

IOCs

Indicator Type Description First Seen
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Teams/1.3.00.30866 Chrome/80.0.3987.165 Electron/8.5.1 Safari/537.36 User Agent Default user agent associated with TeamFiltration activity
44.220.31[.]157 IP Address Source IP associated with UNK_SneakyStrike activity 04/01/2025
44.206.7[.]122 IP Address Source IP associated with UNK_SneakyStrike activity 07/01/2025

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago