Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

Cybersecurity researchers have uncovered a new account takeover (ATO) campaign that leverages an open-source penetration testing framework called TeamFiltration to breach Microsoft Entra ID (formerly Azure Active Directory) user accounts.
The activity, codenamed UNK_SneakyStrike by Proofpoint, has targeted over 80,000 user accounts across hundreds of organizations’ cloud tenants since a surge in

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

Next Post

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Related Posts
Total
0
Share