Job Alerts

TeamFiltration & Entra ID: Token Abuse, Account Takeovers, and the Case for Zero-Trust OAuth

Article by: Marc Streefland

Threat Actor Abuse of Open Source Tool Against Microsoft Entra ID

Prepared: June 2025 | Source Analysis by: Research GPT | Marc Streefland (XIS10CIAL)

Executive Summary

  • Threat actor “UNK_SneakyStrike” has abused an open-source framework (TeamFiltration) to automate account takeovers (ATOs) across over 80,000 Microsoft accounts and 100 cloud tenants.

  • Microsoft Entra ID (formerly Azure AD) is being exploited through Teams API, conditional access misconfigurations, and OAuth token abuse.

  • The campaign illustrates a strategic shift toward cloud-native persistence, using legitimate APIs and token families for stealth and lateral access.

Key Risks Identified

Vector

Description

Teams API Enumeration

Abused to identify valid users without triggering login alerts.

Conditional Access Gaps

MFA is often misapplied, especially in apps like Teams.

Family Refresh Tokens (FRTs)

OAuth tokens for one app grant access to others in the same family.

API-Based Stealth

Traffic mimics legitimate usage — avoids detection by traditional tools.

Geo-Distributed Password Sprays

TeamFiltration uses AWS to rotate IP origins, evading IP-based defenses.

Priority Recommendations

  • For CISOs & Cloud Teams Immediate Actions

  • Enforce MFA for all apps including Teams and legacy clients.

  • Audit conditional access for app-by-app gaps.

  • Disable legacy authentication protocols (e.g., basic auth).

  • Implement OAuth-aware behavioral analytics.

  • Monitor for TeamFiltration indicators and rotate credentials at first sign of compromise.

Strategic Foresight

Emerging Trend

Impact

Identity tokens > passwords

OAuth tokens are now the primary target and persistence method.

Red-team tools as threatware

Open-source frameworks like TeamFiltration are being weaponized at scale.

Token lifecycle scrutiny

Pressure will rise on Microsoft to scope, bind, and audit refresh tokens.

API-native NDR/XDR tools

The future of detection lies in monitoring cloud-native API behavior — not IPs or endpoints.

Call to Action

  • Organizations must treat cloud-native API misuse as a top-tier APT-level risk.

  • Vendors like Microsoft should lead reform in token governance and access scope minimization.

  • Security teams must invest in identity-centric detection and red-team abuse telemetry.

Deep Drill

We’re diving into a complex and emerging threat landscape surrounding TeamFiltration abuse for Microsoft Entra ID (formerly Azure AD) account takeovers, specifically through the lens of the UNK_SneakyStrike campaign.

PHASE 1: Foundational Exploration

Core Principles & Definitions

Concept

Definition

TeamFiltration

Open-source post-exploitation framework targeting Microsoft cloud services. Automates enumeration, password spraying, data exfiltration, and persistence.

Account Takeover (ATO)

The act of gaining unauthorized access to a user's account, typically by exploiting misconfigurations or weak credentials.

Microsoft Entra ID

Identity and access management service (previously Azure AD), critical for controlling authentication and authorization in Microsoft ecosystems.

Password Spraying

Attack method that tries common passwords across many accounts to avoid triggering lockouts.

Conditional Access Gaps

Weaknesses in access policies that can be bypassed, e.g., MFA not enforced on all apps.

Family Refresh Tokens (FRTs)

A Microsoft OAuth token concept allowing access to all apps in the same Client ID family, used for persistent unauthorized access.

Key Actors & Influencers

Category

Entity

Role

Tool Developer

Melvin Langvik

Created Team Filtration; first demonstrated its capabilities at DEFCON 30.

Threat Research Firm

Proofpoint

Discovered and named the UNK_SneakyStrike campaign. Provided detailed TTP (tactics, techniques, procedures) insight.

Cybersecurity Community

DEFCON, SecureWorks, GitHub infosec contributors

Platforms and people advancing understanding of threat emulation tools.

Microsoft

Identity and cloud security target and service provider; architectural decisions directly impact the threat surface.

Historical & Paradigm Shifts

Timeframe

Event/Change

Implication

2020

TeamFiltration developed and tested during a pentest

First practical application highlighted MFA misconfiguration vulnerabilities.

DEFCON 30

(Aug 2022)

Public release of TeamFiltration

Democratized offensive capabilities; blurred lines between red team tools and APT exploitation.

Late 2024

UNK_SneakyStrike campaign begins

Marked a shift from ethical red teaming to scaled malicious abuse of pentest tools.

Ongoing

Rise of post-authentication cloud-native attack frameworks

Highlights systemic risk in assuming MFA and conditional access alone are sufficient.

Primary Challenges & Systemic Risks

Challenge

Description

Impact

Abuse of Red Team Tools

Frameworks like TeamFiltration offer near-APT-grade capability openly.

Threat actors can launch sophisticated attacks with little investment.

Cloud Identity Complexity

Microsoft’s Entra ID architecture has inconsistencies in token refresh, app segregation, and conditional access enforcement.

Enables token reuse, incomplete MFA enforcement, and persistent access.

Detection Difficulty

TeamFiltration uses legitimate APIs and services, mimicking real user behavior.

Makes detection via traditional SIEM/SOC tools less effective.

Credential Exposure

Even temporary exposure of valid credentials becomes critical due to tool automation.

Accelerates exploitation window and lateral movement.

Lack of Organizational Hygiene

Many tenants still misconfigure Teams, conditional access, or fail to enforce universal MFA.

Provides easy inroads for adversaries.

Concept Map (Text-based View)

Annotated References
  1. Proofpoint Research – Dark Reading summary of TeamFiltration abuse (Source for UNK_SneakyStrike ATO campaign details)

  2. DEFCON 30 Presentation by Langvik – Introduction of TeamFiltration's architecture and original use case.

  3. SecureWorks: OAuth Token Research – Origins of the “family refresh token” terminology and threat model.

  4. Microsoft Entra Documentation – Conditional Access, Token Authentication, and Application Segmentation.

  5. GitHub: TeamFiltration Repo – Langvik’s GitHub hosts the open-source framework and tool logic.

PHASE 2: System Decomposition

Objective: Break down the TeamFiltration-based ATO threat into its architectural, operational, and strategic subcomponents. We'll map their interactions, identify interdependencies, and apply a SWOT analysis + supporting system diagram.

1. Deconstructed System Components

Layer

Component

Description

Access Layer

Microsoft Entra ID (Azure AD)

Identity management system targeted for credential access and token abuse.

Attack Framework

TeamFiltration

Open-source tool automating account discovery, spraying, exfiltration, and persistence.

Attack Vector

Teams API

Used for enumeration and bypassing MFA if improperly configured.

Infrastructure

AWS Cloud (Rotating Regions)

Used to mask source IPs and simulate geographic dispersion.

Persistence Mechanism

Family Refresh Tokens (FRTs)

Exploited to access entire application families once foothold is gained.

Data Exfiltration

OneDrive & Teams

Communication, document, and chat logs are siphoned once access is obtained.

Target Tenants

Microsoft Cloud Tenants (100+)

Both small and large organizations were targeted, with variable depth.

2. Interactions and Dependencies

3. SWOT Analysis: TeamFiltration as an ATO Threat Tool

Strengths

- Fully automated ATO workflow (enumeration → persistence).- Legitimate API usage enables stealthy activity.- AWS Region rotation defeats simple geo-IP blocks.- FRT abuse enables broad scope from one foothold.

Weaknesses

- Requires valid credentials to start.- AWS account needed for rotation logic.- Dependent on target misconfigurations (e.g., non-MFA Teams).- Detection possible with advanced behavioral analytics.

Opportunities

- More sophisticated frameworks could adopt this model.- Possible integration with initial access brokers (IABs).- Defense research into behavioral baselines can refine detection.- Red teaming frameworks could be hardened to prevent misuse.

Threats

- Commodification of ATO capabilities through open tools.- Organizations unaware of Teams-specific risks.- Cloud- native attacks harder to detect and trace.- Increasing attacker reliance on misconfig- based access.

Component Ecosystem Matrix

Component

Depends On

Synergizes With

Risk If Compromised

TeamFiltration

AWS Infra, Valid Credentials

Teams API, FRTs

Full system compromise + data loss

Teams API

Entra ID identity graph

MFA policy

Enables account discovery + stealth access

FRT Tokens

OAuth scope, app registration

Multiple apps in tenant

Expands lateral access silently

OneDrive/Team s

Token or credential access

TeamFiltration plugins

Data exfiltration at scale

Conditional Access

Proper configuration

Entra ID + user groups

Key barrier to exploitation; misconfig = bypass

Attack Chain Summary (MITRE ATT&CK-style Flow)

Step

Technique

Tool Function

1. Initial Access

Valid credential acquisition (T1078)

Supplied or brute-forced via password spraying

2. Discovery

Account enumeration (T1087.002)

Teams API for user enumeration

3. Credential Access

Password spraying (T1110.003)

AWS-rotated IPs evade brute-force lockouts

4. Persistence

Abuse of refresh tokens (T1525)

Use of FRT to stay logged into multiple services

5. Exfiltration

Data staging + export (T1020, T1048)

Downloading files, chats, contacts via API

Summary Diagram (Text-Only Representation)

PHASE 3: Iterative Distillation

Objective: Evaluate and refine emerging insights from prior analysis to identify high-impact solutions and novel threat prevention paradigms.

1️ Emerging Patterns and Strategic Threat Paths

Top Exploitable Gaps

Threat Vector

Description

Root Weakness

Teams-only MFA bypass

Entra conditional access policies may exclude Teams (or use legacy clients).

Granular access policies are inconsistently applied.

Token Family Abuse (FRT)

OAuth refresh tokens for one app can allow lateral access to all sibling apps.

Microsoft’s token family design favors convenience over compartmentalization.

Geo-rotated password spraying

AWS region rotation avoids blacklisting and detection.

IP-based geofencing is outdated and easily circumvented.

Cloud-native stealth

Use of legitimate APIs (Teams, Graph) mimics benign traffic.

Behavior-based detection is underutilized or immature.

2️ Solution Pathways: Comparative Cross-Analysis

Solution

Feasibility

Scalabilit y

Novelty

Long-Term Value

Enforce full MFA coverage (esp.

Teams)

High

High

Low

High — Basic hygiene fix; needs org-wide enforcement.

Audit FRT scopes and limit app family tokens

Medium

Medium

Medium

High — Requires vendor- level design change (Microsoft).

Behavioral anomaly detection (BAE/NDR)

Medium

High

Medium- High

High — Moves beyond signatures; detects misuse of legit APIs.

Token binding or scoped refresh tokens

Low (currently)

Medium

High

High — Token-binding to context (device/IP/app) could prevent FRT abuse.

Pentest tool abuse intelligence feeds

High

High

Medium

Medium — Integrate known abuse indicators into SIEM/SOAR pipelines.

3⃣ Assumption Testing

Assumption

Valid?

Refinement

“Enforcing MFA across all apps will stop ATOs.”

+ Partial

MFA can be bypassed if not enforced on all entry points (e.g., legacy auth clients or Teams). Needs continuous token validation.

“FRT abuse is rare or theoretical.”

+

Disproven

Actively exploited in this campaign. Defense should shift to token lifecycle management and reduced token privilege scopes.

“TeamFiltration needs insider access.”

+

TeamFiltration uses external AWS infrastructure and needs only valid credentials, not privileged access. Prevention must focus on initial access barriers and post-auth behavior.

4⃣ Refined Insights (Distilled Summary)

Key Takeaways

  • Conditional Access ≠ Sufficient: Misconfigured or overly permissive policies enable Teams-based footholds even when MFA is broadly enforced.

  • Token Families Are Dangerous by Design: Access gained to one app can be silently extended to others due to FRT behavior. This multiplies blast radius after initial access.

  • Attackers Prefer Stealth via APIs: Cloud-native attack surfaces (Teams, Graph API) are now the preferred vector — because they blend in.

  • Traditional Indicators Are Obsolete: Threat actors rotating AWS regions and using standard endpoints bypass classic IP reputation and anomaly filters.

5⃣ Abductive Forecasts: If Current Trends Continue...

Forecast

  • Open red team tools will be commoditized as malware

  • Access tokens will be more valuable than passwords

  • Cloud-native detection will become mandatory

  • Microsoft will be forced to redesign token families

Description

  • TeamFiltration-type tools will proliferate and power new attack kits.

  • Identity tokens will become the new currency of APTs and ransomware groups.

  • SOCs will require behavioral AI tuned for API usage patterns.

  • Token scopes, lifetimes, and app grouping will face pressure for overhaul.

PHASE 4: Synthesis & Visioning

Objective: Project the strategic horizon based on current threat trends, envision defense and innovation trajectories, and translate technical insights into broader conceptual models.

1. Future Scenarios Based on Current Trajectory

Scenario A: Token-Centric Warfare Becomes the New Norm

Identity tokens, not credentials, become the primary target. Attackers shift focus to token hijacking and lateral movement via refresh token abuse.

  • Defensive Consequence:

    • Organizations pivot to token binding, auditing token families, and

revocation automation.

  • Cloud providers re-engineer OAuth standards to reduce token family scopes.

Scenario B: Red Team Tool Abuses Become Commoditized

Tools like TeamFiltration follow the same trajectory as Cobalt Strike: open

source → APT tool → commodity malware.

  • Defensive Consequence:

    • SOCs must build behavioral detection pipelines tuned to specific red-team frameworks.

    • New industry standards emerge for “offensive tool fingerprinting.”

Scenario C: Cloud API Activity Becomes Fully Observable

Organizations adopt API-centric telemetry as a first-class security input —

prioritizing behavior over endpoint or IP intelligence.

  • Innovation Opportunity:

    • Rise of API-native NDR/XDR tools (Network/Extended Detection & Response).

    • Graph-based models correlate login flows, token patterns, and cloud-native anomalies.

      2. Strategic Leverage Points

Leverage Point

Why It Matters

Recommended Direction

Token Lifecycle Redesign

Tokens like FRTs are too powerful, persistent, and opaque.

Advocate for shorter-lived, scoped, context-bound tokens.

Red Team Tool Registration

Lack of traceability enables dual-use tool abuse.

Create hash-signing + abuse telemetry models for pentest frameworks.

Cloud-Native Behavioral Baselines

Current defenses rely on IP/geolocation or signature

— both fail.

Develop per-user behavioral baselines across API calls and token behavior.

Security Standards for API Use

APIs like Teams and Graph are exploitable due to permissiveness.

Push for access-aware APIs with MFA-conditional responses and telemetry hooks.

3. Analogies & Models for Cross-Domain Communication

Analogy: TeamFiltration as a “Cloud Immune System Hijacker”

Like a virus that hides from immune response by mimicking host proteins, TeamFiltration hides in cloud traffic by impersonating normal API calls.

  • Implication: Defenses must move beyond foreign signature detection to detecting

“wrong behavior by familiar agents.”

Metaphor: “Skeleton Key for Cloud Tenants”

Gaining one token (via a single MFA gap) becomes a skeleton key, unlocking a family of apps across the tenant — invisible to traditional controls.

  • Defense translation: Treat any token with broad refresh scopes as potentially privileged and subject to lifecycle audit.

Model: Zero-Trust OAuth (ZTO)

New paradigm proposal:

Instead of trusting any token by default within its family, design token validation layers that include:

  • Device fingerprinting

  • Time-window relevance

  • Context validation (geo, app type)

  • Revocation-awareness by default

Think of this as an "OAuth-aware Zero Trust extension" — a conceptual bridge between identity and runtime behavior analytics.

4. Innovation Opportunity Canvas

Category

Description

Problem

Token abuse and red team tool commoditization bypass traditional security controls.

Target Users

SOCs, cloud architects, DevSecOps teams, red teams, IAM architects.

Proposed Innovations

Token-scoped behavioral validation engine, TeamFiltration behavior fingerprint DB, ZTO middleware.

Key Differentiator

Native to cloud APIs and identity flows — no need for endpoint agents or legacy SIEM dependency.

Metrics of Success

Time-to-detection of token abuse, % of policy gaps closed, false positive reduction in red-team simulation.

Summary: Strategic Synthesis

  • Current systems are vulnerable because they assume trust within token families and legitimate APIs.

  • Attackers now mimic normal behavior better than traditional tools detect abnormal behavior.

  • We must pivot to a model where identity, behavior, and token logic are analyzed in unison — in real time.

PHASE 5: Expert Calibration & Feedback Loop

Objective: Simulate peer review from domain experts, test insights against expert heuristics, and refine the output into a final, validated deliverable: the Final Distilled Intelligence File (FDIF).

1. Simulated Expert Panel

1.1 Cloud Security Architect

Primary Concern: Over-permissive token design

Feedback:

  • “The FRT token abuse model is under-discussed in enterprise architecture circles. Scoped refresh tokens and device-pinning should be a top priority.”

  • Validates the concept of a ZTO (Zero-Trust OAuth) layer as practical and necessary in token governance.

1.2 Red Team Operator

Primary Insight: Tool abuse detection lag

Feedback:

  • “Tools like TeamFiltration are now as accessible as Metasploit. Defenders underestimate how fast they’re being commodified.”

  • Supports creating behavioral fingerprinting repositories for open-source offensive tools.

1.3 Microsoft Identity Engineer

Primary Focus: Conditional Access policies

Feedback:

  • “Customers mistakenly apply conditional access only to core apps — leaving Teams,

PowerShell, and legacy APIs unguarded.”

  • Emphasizes need for MFA coverage audits, especially in hybrid AD scenarios.

1.4 SOC Analyst (Tier 2)

Operational Viewpoint Feedback:

  • “IP geofencing and user-agent filters are failing. We need visibility into token refresh flows and API call patterns, not just login events.”

  • Strong support for cloud-native NDR/XDR models with OAuth telemetry hooks.

    2. Final Integrations (Refined Summary)

Insight Refined

Original

Expert-Adjusted

Token binding needed

Token lifecycle redesign

Must include device-bound refresh tokens

Behavioral anomaly detection

API stealth detection

Add per-user baseline training to avoid false positives

Teams MFA gaps

Conditional access misconfig

Must conduct app-by-app MFA audit, not assume inheritance

Tool abuse monitoring

Signature-based blacklists

Build behavioral IOCs and open-source tool threat databases

Final Distilled Intelligence File (FDIF)

Title:

Threat Actor Abuses TeamFiltration for Entra ID Account Takeovers — Strategic Analysis & Future Defense Paradigms

1. Foundational Summary

  • TeamFiltration is an open-source post-exploitation tool targeting Microsoft Entra ID via Teams API and OAuth vulnerabilities.

  • Used by a threat actor (UNK_SneakyStrike) to attack 80,000+ accounts across ~100 cloud tenants.

  • Abuse focused on enumeration, password spraying, and persistent access via refresh token exploitation.

2. System Dynamics Map

  • Attack chain includes: AWS-based geo-rotated spraying → Teams enumeration → FRT token hijack → lateral movement → data exfiltration.

  • Misconfigured MFA enforcement and token overreach are critical systemic weaknesses.

3. Distilled Strategic Insights

Insight

Summary

Token Families = High Risk

FRTs enable stealthy lateral movement within app groups

Conditional Access ≠ Total

Coverage

Teams often escapes MFA, enabling footholds

Open Tools Fuel Threat Acceleration

Red-team tools are now used by APTs and commoditized threat actors

IP & Signature-Based Detection is Obsolete

Behavior-based analytics and OAuth-aware telemetry are required

4. Visioning Frameworks

  • ZTO (Zero-Trust OAuth): New paradigm for context-bound token use and telemetry-aware refresh validation.

  • Cloud-Native Behavior Analytics: Move from endpoint detection to API flow monitoring + identity fingerprinting.

  • Open Tool Fingerprinting Registry: Collective intelligence for detecting misuse of dual-use tools like TeamFiltration.

5. Innovation Opportunities

Area

Concept

Token Governance

Device-pinned, scope-limited refresh tokens

API Threat Visibility

Real-time OAuth-aware anomaly scoring

SOC Enablement

Open-source behavior profiles for pentest tools

Vendor Influence

Push Microsoft to reduce implicit trust in token families

6. Strategic Recommendations

Entity

Action

Organizations

Audit MFA enforcement across all apps (esp. Teams); disable legacy auth; monitor token flows.

Vendors (Microsoft)

Redesign FRT architecture; introduce context-aware token validation; MFA by default on all endpoints.

Security Vendors

Build identity-focused NDR/XDR layers; incorporate refresh token telemetry; support red-team abuse detection.

Community

Develop behavioral indicators of open red-team tool use; fund open research into OAuth token risk modeling.

Summary:

This research investigates the large-scale abuse of the open-source Team Filtration framework

by a threat actor (UNK_SneakyStrike) targeting Microsoft Entra ID environments. It deconstructs

the attack chain, highlights systemic weaknesses in conditional access and token architecture,

and proposes forward-compatible defense models such as Zero-Trust OAuth (ZTO) and behavioral

API analytics for SOCs and security vendors.

References:

About the author:

Marc Streefland, also known by his handle XIS10CIAL, is an independent cybersecurity researcher specializing in Microsoft Entra ID, identity security, and cloud-native threats. With deep expertise in Red Team tooling, OAuth exploitation, and account takeover tactics, Marc focuses on uncovering vulnerabilities that adversaries abuse at scale. He shares his findings through in-depth research files, blogs, and security advisories published on xis10cial.com and marcstreefland.nl. In this article, he draws on his investigations into the UNK_SneakyStrike campaign to explain how attackers exploit token-based authentication and what defenders can do to build more resilient, Zero-Trust aligned defenses.