TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Trend Micro Research

From Misconfigured Spring Boot Actuator to SharePoint Exfiltration: How Stolen Credentials Bypass MFA

Reine Roque · 2026-03-18 · Read original ↗

ATT&CK techniques detected

4 predictions
T1552.001Credentials In Files
83%
“##dump, / env, and / configprops ) about a running spring boot application. in this incident, spring boot actuator endpoints were exposed without authentication. the requests returned an http 200 status code and revealed sensitive information. although no plaintext credentials we…”
T1528Steal Application Access Token
70%
“application sends to the identity provider ( azure ad / entra id ) a request containing the : - client - id - client - secret - username - password 2. the identity provider validates the credentials. 3. if valid, it returns an access token. 4. the application uses the token to ac…”
T1525Implant Internal Image
62%
“application sends to the identity provider ( azure ad / entra id ) a request containing the : - client - id - client - secret - username - password 2. the identity provider validates the credentials. 3. if valid, it returns an access token. 4. the application uses the token to ac…”
T1525Implant Internal Image
61%
“weaknesses, and access to sensitive cloud data cyber risk exposure management does not evaluate risks in isolation. instead, it correlates exposures across identities, cloud services, and external attack surfaces to identify complete attack paths. a single issue may appear modera…”

Summary

Not every cloud breach starts with malware or a zero-day. In this incident, attackers discovered an exposed Spring Boot Actuator endpoint, harvested credentials from leaked configuration data, then used the OAuth2 Resource Owner Password Credentials (ROPC) flow to authenticate without MFA.