Saturday, May 24, 2025
HomeCyber AttackNew Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco Talos, active since at least January 2025.

This campaign exploits commercial remote monitoring and management (RMM) tools, such as PDQ Connect and N-able Remote Access, to gain unauthorized access to victims’ systems.

The attackers, identified with high confidence as initial access brokers (IABs), use deceptive tactics to distribute malicious installers disguised as legitimate files related to Brazil’s electronic invoice system, NF-e.

- Advertisement - Google News

These spam messages, often posing as notifications from financial institutions or cell phone providers about overdue bills or payment receipts, lure users into clicking malicious links hosted on Dropbox.

Remote Monitoring Tools
Spam message purporting to be from a cell phone provider. 

Once clicked, these links download executable files with names like “AGENT_NFe_<random>.exe” or “Boleto_NFe_<random>.exe,” which install the RMM tools, granting attackers full remote control over the compromised systems.

The primary targets include C-level executives, financial, and human resources personnel across industries, including educational and government institutions, amplifying the potential impact of these attacks.

Abusing Free Trials for Malicious Gain

Cisco Talos’s investigation reveals that the threat actors exploit the free trial periods of RMM tools, typically lasting 15 days, to orchestrate their attacks with minimal cost.

By registering trial accounts using free email services like Gmail or Proton Mail, and occasionally compromised personal accounts, the attackers create and distribute malicious agents without relying on stolen credentials.

Testing by Talos confirmed that trial versions of tools like N-able Remote Access offer unrestricted features, including remote desktop access, command execution, screen streaming, keystroke capture, and file management capabilities.

Remote Monitoring Tools
N-able file manager. 

Post-infection, the attackers often install additional RMM tools or disable security software, maintaining access for days before executing further malicious actions or selling access to third parties, such as ransomware operators or state-sponsored actors.

The network traffic generated by these tools blends with legitimate HTTPS communications, using domains like “upload1.am.remote.management” hosted on AWS, making detection and attribution challenging.

While N-able has disabled affected trial accounts, the increasing abuse of such tools signals a growing trend in cyber threats.

Cisco’s security solutions, including Secure Endpoint, Secure Email, and Secure Firewall, offer robust defenses against this campaign by detecting and blocking malicious activities and binaries.

Indicators of Compromise (IOCs)

TypeIndicator
Network IOCshxxps://upload1[.]am[.]remote[.]management/
hxxps://upload2[.]am[.]remote[.]management/
hxxps://upload3[.]am[.]remote[.]management/
hxxps://upload4[.]am[.]remote[.]management/
198[.]45[.]54[.]34[.]bc[.]googleusercontent[.]com
RMM Installer Hashes03b5c76ad07987cfa3236eae5f8a5d42cef228dda22b392c40236872b512684e (Example)
Additional hashes available on Cisco Talos GitHub repository

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...