Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool

Cybersecurity researchers have uncovered a new account takeover (ATO) campaign that leverages an open-source penetration testing framework called TeamFiltration to breach Microsoft Entra ID (formerly Azure Active Directory) user accounts. The activity, codenamed UNK_SneakyStrike by Proofpoint, has affected over 80,000 targeted user accounts across hundreds of organizations' cloud tenants since a

Posted from: Click here for the full article.

留言

此網誌的熱門文章

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT