Threat IntelHIGH

Threat Intel - Remote Management Software Abuse Explained

Featured image for Threat Intel - Remote Management Software Abuse Explained
HNHuntress Blog
RMM AbuseThreat ActorsCredential HarvestingDaisy-ChainingHuntress
🎯

Basically, hackers are using remote management tools to sneak into systems and stay hidden.

Quick Summary

Cybercriminals are increasingly exploiting remote management tools for initial access and persistence. This trend poses serious risks to organizations, complicating detection and response efforts. Vigilance and proactive measures are essential to combat this growing threat.

The Threat

The abuse of remote monitoring and management (RMM) tools has surged dramatically, becoming a common tactic among threat actors. In 2025, RMM abuse accounted for 24% of all cyber incidents, reflecting a 277% increase from previous years. This alarming trend indicates that attackers are moving away from traditional hacking methods, opting instead to leverage legitimate software for malicious purposes. This blog explores how these actors daisy-chain RMM tools to enhance their operations, making it harder for organizations to detect and respond to their activities.

Who's Behind It

Threat actors abusing RMM tools range from low-skilled individuals to well-established groups. These actors often utilize rogue MSI installers to gain initial access to target systems. For instance, some have been observed using large language model (LLM) generated scripts to identify valuable user accounts by parsing browser histories for references to financial platforms like QuickBooks and Coinbase. While the intent is clear, the execution often lacks sophistication, revealing a mix of skill levels among these attackers.

Tactics & Techniques

One common tactic involves daisy-chaining RMM tools, where attackers use multiple software solutions to fragment telemetry and complicate attribution. For example, they might deploy ScreenConnect via legitimate deployment tools like Action1, creating persistent access points. This method not only helps in maintaining control over compromised systems but also aids in evading detection by security measures. Attackers have even been seen leveraging GitHub repositories to host phishing infrastructure, showcasing a deliberate approach to their operations.

Defensive Measures

Organizations must be vigilant in their defense against these evolving tactics. Regularly updating and patching software can mitigate vulnerabilities that RMM tools exploit. Additionally, implementing strict access controls and monitoring for unusual activity can help detect potential abuses early. Training employees to recognize phishing attempts and suspicious downloads is also crucial. As threat actors continue to refine their methods, staying informed and prepared is essential for maintaining cybersecurity resilience.

🔒 Pro insight: The rise in RMM tool abuse signals a shift in attacker tactics, emphasizing the need for enhanced monitoring and response strategies in organizations.

Original article from

Huntress Blog

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - Managing Cyber Risk Amid Rising Attacks

Financially motivated cyber attacks are escalating, prompting a need for businesses to enhance their security measures. Experts highlight the evolving ransomware landscape and the importance of real-time threat intelligence. Staying informed is crucial for effective defense against these threats.

SC Media·
MEDIUMThreat Intel

Threat Intel - Companies Face Tough Choices Blaming Hackers

After a cyberattack, companies face tough choices about naming hackers. This decision impacts everything from retaliation risks to insurance claims. It's a complex landscape that requires careful navigation.

Cybersecurity Dive·
HIGHThreat Intel

Threat Intel - Data Exfiltration and Actor Infrastructure Exposed

A recent investigation revealed how threat actors exposed their data exfiltration methods. Insufficient security measures led to this incident, affecting organizations' defenses. Understanding these tactics is crucial to enhance security.

Huntress Blog·
HIGHThreat Intel

MuddyWater - Unmasking an Intrusion Attack Chain

Huntress has uncovered a detailed timeline of a MuddyWater attack, revealing the tactics used by this Iranian-linked APT. An Israeli company was targeted, showcasing the need for robust defenses against sophisticated cyber threats.

Huntress Blog·
HIGHThreat Intel

Threat Intel - Actor Exploits Elastic Cloud Free Trial

A threat actor exploited Elastic Cloud's free trial for data exfiltration, affecting multiple organizations. This incident underscores the ongoing risks in cybersecurity. Immediate action is being taken to address the vulnerabilities.

Huntress Blog·
HIGHThreat Intel

Cybercrime Threat Intel - Inside the Dark Economy Revealed

Cybercrime is a structured business with organized scam centers. Understanding their tactics is key to protecting yourself. Stay informed and learn how to defend against these evolving threats.

Huntress Blog·