Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Three nation-state threat actors, APT29 (Midnight Blizzard), APT33 (Curious Serpens), and UTA0355, are actively exploiting the open-source ROADtools framework to compromise Microsoft Entra ID environments through rogue device registration and Primary Refresh Token (PRT) abuse. The attack achieves persistent, MFA-bypassing access to Microsoft cloud services using legitimate API calls, making it indistinguishable from normal administrative traffic. Any organization running Microsoft Entra ID without enforced Conditional Access policies requiring compliant devices is at risk of undetected, long-term identity compromise that can cascade across the entire Microsoft 365 and Azure estate.

Author

Tech Jacks Solutions