Paved With Intent: Unit 42 Details Nation-State Abuse of ROADtools for Cloud Intrusions

Nation-State Actors Weaponize Open-Source ROADtools for Azure Cloud Attacks, Bypassing MFA and Persisting in Networks

HIGH
May 22, 2026
6m read
Cloud SecurityThreat IntelligenceThreat Actor

Related Entities

Threat Actors

Midnight Blizzard Curious SerpensVoid BlizzardUTA0355

Products & Tech

Full Report

Executive Summary

ROADtools, a publicly available open-source framework designed for Microsoft Azure and Entra ID security research, has been co-opted by nation-state threat actors as a powerful attack utility. Adversaries, including groups tracked as Midnight Blizzard and Curious Serpens, are leveraging ROADtools for discovery, persistence, and defense evasion in cloud environments. The tool's ability to operate through legitimate Microsoft APIs and mimic normal traffic allows it to blend in and evade traditional detection methods. Key abuse cases involve registering rogue devices to bypass MFA, manipulating OAuth tokens to maintain access, and enumerating tenant configurations to identify further attack paths. This analysis from Unit 42 breaks down how attackers misuse the tool and provides defenders with crucial detection and mitigation strategies.


Threat Overview

Originally built for red teaming and security research, ROADtools provides a suite of functionalities for interacting with Azure's identity and authentication layers. Its misuse has been documented in several recent nation-state intrusions. Threat actors find it valuable because it allows them to automate complex interactions with Entra ID, often in ways that are indistinguishable from legitimate administrative activity.

The framework is composed of several key modules:

  • roadrecon: Used for discovery and enumeration. It gathers data about users, groups, applications, and devices in an Entra ID tenant and presents it in a navigable web interface.
  • roadtx: Facilitates OAuth token acquisition and exchange. Attackers use this to replay stolen tokens, register devices, and interact with cloud services as a legitimate user.
  • roadlib: The underlying library that handles API requests and authentication, providing the flexibility to script and customize attacks.

By using these modules, an attacker with initial credentials can quickly map out an entire cloud environment, escalate privileges, and establish durable persistence mechanisms that survive password resets.


Technical Analysis

Adversaries are leveraging ROADtools to execute specific MITRE ATT&CK techniques within cloud environments.

Persistence: Device Registration (T1098.005)

One of the most impactful uses of ROADtools is for device registration. Using the roadtx module, an attacker with a user's credentials can register their own device within the target's Entra ID tenant. This registered device is then trusted by the organization. Depending on the configuration of Conditional Access Policies (CAPs), this can allow the attacker to bypass MFA requirements when authenticating from their rogue device. This creates a powerful and persistent form of access that is difficult to detect and revoke.

# Example of using roadtx to register a device (conceptual)
python roadtx.py device -u victim@example.com -p 'password' --register-device --device-name 'Not-A-Threat-Actor-Laptop'

Discovery: Cloud Account Enumeration (T1087.004)

The roadrecon module is a powerful discovery tool. After authenticating, an attacker can use it to dump a wealth of information from the tenant via the Microsoft Graph API. This includes:

  • Users and their group memberships
  • Service principals and application registrations
  • Privileged roles and their assignments
  • Conditional Access Policies and their configurations

The tool stores this data in a local SQLite database, allowing the attacker to analyze it offline and identify high-value targets or misconfigurations for privilege escalation.

Defense Evasion: Mimicking Legitimate Traffic

ROADtools is designed to use legitimate Microsoft APIs (like the Graph API and Azure device registration service). Furthermore, it allows attackers to customize HTTP request attributes, such as the User-Agent string. This makes it challenging to create simple, signature-based detection rules, as the malicious traffic can be made to look identical to traffic from legitimate scripts or administrative tools.


Impact Assessment

The abuse of ROADtools poses a significant threat to organizations relying on Azure and Entra ID. A successful attack can lead to:

  • Persistent Environment Access: Attackers can maintain access even if initial credentials are changed.
  • MFA Bypass: Rogue device registration can undermine a cornerstone of modern identity security.
  • Data Exfiltration: Unfettered access to cloud resources can result in the theft of sensitive data from SharePoint, OneDrive, and other Microsoft 365 services.
  • Privilege Escalation: Attackers can use the discovered information to move laterally and gain administrative control over the cloud environment.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were provided in the source article.


Cyber Observables — Hunting Hints

Security teams can hunt for potential misuse of ROADtools by looking for the following patterns:

Type
user_agent
Value/Pattern
roadlib/*
Description & Context
Hunt in web/API logs: The default User-Agent for ROADtools contains this string. While it can be changed, many attackers may not bother.
Type
log_source
Value/Pattern
Entra ID Audit Logs
Description & Context
Monitor for specific events: Look for Add registered owner to device and Add registered users to device events, especially when initiated by non-administrative users or from unfamiliar locations/IPs.
Type
command_line_pattern
Value/Pattern
python roadtx.py or python roadrecon.py
Description & Context
Hunt in endpoint logs: If command-line logging is enabled on endpoints, searching for the execution of the tool's main Python scripts can be a high-fidelity indicator.
Type
api_endpoint
Value/Pattern
urn:ms-drs:enterpriseregistration.windows.net
Description & Context
Monitor token requests: Look for anomalous OAuth token requests for the Azure device registration service endpoint, especially when correlated with suspicious sign-in behavior.

Detection & Response

  • Monitor Entra ID Logs: The most critical data source is the Entra ID audit and sign-in logs. Forward these logs to a SIEM for analysis. Create alerts for:
    • Device registrations from unexpected user accounts or IP ranges.
    • High-volume enumeration activity against the Microsoft Graph API from a single account.
    • Application consent grants for new or unfamiliar service principals.
    • Use of roadlib or other Python-based User-Agent strings in sign-in logs.
  • Analyze Token Usage: Investigate the issuance and use of Primary Refresh Tokens (PRTs) and access tokens. Anomalies in token claims or usage patterns can indicate abuse.
  • Utilize D3FEND Techniques: Employ Domain Account Monitoring and User Geolocation Logon Pattern Analysis to baseline normal activity and detect deviations that could indicate a compromised account being used with ROADtools.

Mitigation

  • Restrict Device Registration (M1018): Configure Entra ID to restrict which users can register or join devices. Ideally, this should be limited to administrators or managed through a controlled process like Autopilot. Set 'Users may join devices to Azure AD' to 'None' or a specific group of administrators.
  • Strengthen Conditional Access Policies (M1032): Ensure CAPs are robust. Require compliant or hybrid-joined devices for access to sensitive applications, which prevents attackers from using a simple registered device to bypass controls.
  • Principle of Least Privilege (M1026): Limit the number of users with high-privilege roles. Use Privileged Identity Management (PIM) to provide just-in-time access to administrative roles.
  • Monitor Application Consents: Be vigilant about new applications or service principals being granted consent in the tenant. Attackers may use ROADtools to create a malicious application for persistence.

Timeline of Events

1
May 22, 2026
This article was published

MITRE ATT&CK Mitigations

Strictly manage permissions for device registration in Entra ID. Limit this capability to a small group of administrators to prevent users from registering potentially malicious devices.

Mapped D3FEND Techniques:

Enforce strong, phishing-resistant MFA and combine it with Conditional Access Policies that require compliant or hybrid-joined devices, reducing the effectiveness of a simple device registration bypass.

Mapped D3FEND Techniques:

Implement the principle of least privilege and use tools like Privileged Identity Management (PIM) to ensure accounts only have necessary permissions on a just-in-time basis.

Mapped D3FEND Techniques:

Continuously audit Entra ID logs for suspicious sign-ins, device registrations, and application consents to detect anomalies indicative of ROADtools abuse.

Mapped D3FEND Techniques:

Sources & References

Paved With Intent: ROADtools and Nation-State Tactics in the Cloud
Unit 42 (unit42.paloaltonetworks.com) May 21, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ROADtoolsAzureEntra IDCloud SecurityMidnight BlizzardNation-StateOAuthMFA Bypass

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.