A joint Cybersecurity Advisory (CSA) from the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) has been released to alert network defenders to malicious use of legitimate remote monitoring and management (RMM) software.
In October 2022, CISA discovered a massive cyberattack that made use of malicious RMM software that was legitimate.
In this campaign, cybercriminals utilized phishing emails to trick users into downloading reliable RMM software like ScreenConnect and AnyDesk, which they then exploited to steal money from victims’ bank accounts through refund fraud.
Also, the actors could sell victim account access to other cybercriminal or advanced persistent threat (APT) actors.
“Using portable executables of RMM software provides a way for actors to establish local user access without the need for the administrative privilege and full software installation—effectively bypassing common software controls and risk management assumptions”, CISA reports.
Based on a retrospective review of EINSTEIN, a federal civilian executive branch (FCEB)-wide intrusion detection system (IDS) operated and monitored by CISA it was discovered that two FCEB networks may have been the target of malicious activity.
Reports say an executable is downloaded when a recipient visits a first-stage malicious domain. The executable then establishes a connection to a malicious domain that is in the “second stage,” from which it downloads further RMM software.
“The actors did not install downloaded RMM clients on the compromised host. Instead, the actors downloaded AnyDesk and ScreenConnect as self-contained, portable executables configured to connect to the actor’s RMM server”, CISA noted.
In this case, the actors utilized the RMM software to start a refund scam after downloading it. They initially established a connection with the victim’s system, then lured the victim into logging into their bank account while still connected to the system.
The recipient’s bank account summary was later changed by the actors using their access provided by the RMM software.
According to the reports, the falsely modified bank account summary showed the recipient was mistakenly refunded an excess amount of money. The actors then instructed the recipient to “refund” this excess amount to the scam operator.
Network Defenders Should Be Aware Of The Following:
Threat actors frequently target authorized RMM software users. Targets may include managed service providers (MSPs) and IT help desks, who frequently employ legitimate RMM software for network administration, endpoint monitoring, endpoint management, and remote host interaction for IT support tasks.
Hence, these threat actors can exploit trust relationships in MSP networks and gain access to a large number of the victim MSP’s customers.
Network Security Checklist – Download Free E-Book
Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a premier…
Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by empowering…
The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir Kutleshi,…
Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…
A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…
EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…