A TECHNICAL REVIEW OF THE TEAMFILTRATION CAMPAIGN

  • Unique Paper ID: 182152
  • PageNo: 1207-1211
  • Abstract:
  • Team Filtration was a cyber threat campaign that targeted over 80,000 Microsoft Entra ID accounts globally. It is a comprehensive, cross-platform framework specifically built for post-exploitation activities within Microsoft 365 and Microsoft Entra ID. This case study examines the UNK Sneaky Strike cyberattack campaign, which weaponized a legitimate open- source penetration testing tool, detailing how it was used and discussing prevention tactics.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{182152,
        author = {Aflah and Priya P Sajan},
        title = {A TECHNICAL REVIEW OF THE TEAMFILTRATION CAMPAIGN},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {12},
        number = {2},
        pages = {1207-1211},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=182152},
        abstract = {Team Filtration was a cyber threat campaign that targeted over 80,000 Microsoft Entra ID accounts globally. It is a comprehensive, cross-platform framework specifically built for post-exploitation activities within Microsoft 365 and Microsoft Entra ID. This case study examines the UNK Sneaky Strike cyberattack campaign, which weaponized a legitimate open- source penetration testing tool, detailing how it was used and discussing prevention tactics.},
        keywords = {Team filtration, Microsoft Entra Id, Microsoft 365, Cyber threat.},
        month = {July},
        }

Cite This Article

Aflah, , & Sajan, P. P. (2025). A TECHNICAL REVIEW OF THE TEAMFILTRATION CAMPAIGN. International Journal of Innovative Research in Technology (IJIRT), 12(2), 1207–1211.

Related Articles