ROADtools, a publicly available open-source framework designed for Microsoft Azure and Entra ID security research, has been co-opted by nation-state threat actors as a powerful attack utility. Adversaries, including groups tracked as Midnight Blizzard and Curious Serpens, are leveraging ROADtools for discovery, persistence, and defense evasion in cloud environments. The tool's ability to operate through legitimate Microsoft APIs and mimic normal traffic allows it to blend in and evade traditional detection methods. Key abuse cases involve registering rogue devices to bypass MFA, manipulating OAuth tokens to maintain access, and enumerating tenant configurations to identify further attack paths. This analysis from Unit 42 breaks down how attackers misuse the tool and provides defenders with crucial detection and mitigation strategies.
Originally built for red teaming and security research, ROADtools provides a suite of functionalities for interacting with Azure's identity and authentication layers. Its misuse has been documented in several recent nation-state intrusions. Threat actors find it valuable because it allows them to automate complex interactions with Entra ID, often in ways that are indistinguishable from legitimate administrative activity.
The framework is composed of several key modules:
By using these modules, an attacker with initial credentials can quickly map out an entire cloud environment, escalate privileges, and establish durable persistence mechanisms that survive password resets.
Adversaries are leveraging ROADtools to execute specific MITRE ATT&CK techniques within cloud environments.
T1098.005)One of the most impactful uses of ROADtools is for device registration. Using the roadtx module, an attacker with a user's credentials can register their own device within the target's Entra ID tenant. This registered device is then trusted by the organization. Depending on the configuration of Conditional Access Policies (CAPs), this can allow the attacker to bypass MFA requirements when authenticating from their rogue device. This creates a powerful and persistent form of access that is difficult to detect and revoke.
# Example of using roadtx to register a device (conceptual)
python roadtx.py device -u victim@example.com -p 'password' --register-device --device-name 'Not-A-Threat-Actor-Laptop'
T1087.004)The roadrecon module is a powerful discovery tool. After authenticating, an attacker can use it to dump a wealth of information from the tenant via the Microsoft Graph API. This includes:
The tool stores this data in a local SQLite database, allowing the attacker to analyze it offline and identify high-value targets or misconfigurations for privilege escalation.
ROADtools is designed to use legitimate Microsoft APIs (like the Graph API and Azure device registration service). Furthermore, it allows attackers to customize HTTP request attributes, such as the User-Agent string. This makes it challenging to create simple, signature-based detection rules, as the malicious traffic can be made to look identical to traffic from legitimate scripts or administrative tools.
The abuse of ROADtools poses a significant threat to organizations relying on Azure and Entra ID. A successful attack can lead to:
No specific Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were provided in the source article.
Security teams can hunt for potential misuse of ROADtools by looking for the following patterns:
roadlib/*Add registered owner to device and Add registered users to device events, especially when initiated by non-administrative users or from unfamiliar locations/IPs.python roadtx.py or python roadrecon.pyurn:ms-drs:enterpriseregistration.windows.netroadlib or other Python-based User-Agent strings in sign-in logs.Domain Account Monitoring and User Geolocation Logon Pattern Analysis to baseline normal activity and detect deviations that could indicate a compromised account being used with ROADtools.M1018): Configure Entra ID to restrict which users can register or join devices. Ideally, this should be limited to administrators or managed through a controlled process like Autopilot. Set 'Users may join devices to Azure AD' to 'None' or a specific group of administrators.M1032): Ensure CAPs are robust. Require compliant or hybrid-joined devices for access to sensitive applications, which prevents attackers from using a simple registered device to bypass controls.M1026): Limit the number of users with high-privilege roles. Use Privileged Identity Management (PIM) to provide just-in-time access to administrative roles.Strictly manage permissions for device registration in Entra ID. Limit this capability to a small group of administrators to prevent users from registering potentially malicious devices.
Mapped D3FEND Techniques:
Enforce strong, phishing-resistant MFA and combine it with Conditional Access Policies that require compliant or hybrid-joined devices, reducing the effectiveness of a simple device registration bypass.
Mapped D3FEND Techniques:
Implement the principle of least privilege and use tools like Privileged Identity Management (PIM) to ensure accounts only have necessary permissions on a just-in-time basis.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.