Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Navigating the Cloud: Unpacking ROADtools and nation-state strategies in cybersecurity

May 22, 2026 | Threat Intelligence Research

ROADtools: A Comprehensive Threat in Microsoft Environments

TL;DR
ROADtools, developed for red-team operations, is increasingly being exploited by state-sponsored actors in cloud-based attacks, particularly targeting Microsoft Entra ID. Its design allows for stealthy operations through legitimate APIs, posing significant risks to cloud security.

Main Analysis
ROADtools is an open-source toolkit that enables both red-team operations and potential malicious activities. Researchers from Palo Alto Networks highlight how it provides capabilities to enumerate Entra ID resources, register devices, and manipulate authentication tokens. Notably, ROADtools operates through legitimate Microsoft APIs, allowing it to blend in with normal traffic patterns, which complicates detection efforts.

The toolkit features various modules, including ROADrecon for resource discovery and roadtx for token exchanges and device registrations. These modules are especially troubling because they do not require advanced technical skills to be misused by attackers. The flexibility of ROADtools allows attackers to adapt their techniques based on situational needs, further enhancing their ability to evade defenses. For example, the roadtx module’s ability to replay tokens and register devices offers persistent access to adversaries, enabling them to bypass multi-factor authentication mechanisms.

Nation-state threat actors have been observed leveraging this toolkit for sophisticated intrusions. For instance, the Iranian group APT33 reportedly utilized ROADtools following initial access via password spraying. Similarly, the Russian-affiliated UTA0355 used it during a targeted phishing campaign to obtain tokens that allowed unauthorized access to the Microsoft Graph API. These examples underline the real-world applicability and danger posed by the use of ROADtools in cyber-espionage and other malicious activities.

Defensive Context
Organizations must recognize the threats presented by ROADtools, particularly those operating in cloud environments that utilize Microsoft services. Security teams focusing on identity management, authorization, or cloud applications should prioritize awareness of this toolkit due to its potential for misuse. Conversely, organizations with limited Microsoft cloud usage or those operating within domains not related to Microsoft services may not be as directly impacted by this threat.

Why This Matters
The implications are particularly severe for institutions that rely heavily on Microsoft Entra ID, as the reliance on API-driven authentication processes makes these systems vulnerable. Notably, environments employing outdated security measures or lacking robust identity protections are at greater risk, especially if token replay or device registration capabilities are not adequately monitored.

Defender Considerations
To mitigate the risks associated with ROADtools, defenders should focus on monitoring token usage patterns and implementing strict controls on device registration. Regular audits of OAuth permissions and configurations can also help identify excessive privileges which may be abused by attackers. Emphasizing token protection measures and adjusting conditional access policies can further limit the avenues through which adversaries exploit this toolkit.

Indicators of Compromise (IOCs)
– User-Agent strings in HTTP headers indicating ROADtools activity:
– ROADtools
– python-requests/

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles