Criminals use RMM tools to inject malware

B2B Cyber ​​Security ShortNews
Advertising

Share post

Cybercriminals are increasingly abusing remote monitoring and management (RMM) tools, which are supposedly designed for remote maintenance. They use this method to penetrate corporate systems via email campaigns and infect them with malware, according to the results of a recently published study by cybersecurity experts.

Originally developed for remote computer maintenance, RMM tools are now being abused by attackers for data theft, financial fraud, and the distribution of malware—including ransomware. While the use of traditional malware loaders and botnets by Initial Access Brokers (IABs) is declining, RMM tools such as ScreenConnect, Fleetdeck, and Atera are gaining traction in the threat landscape.

Advertising

Companies should restrict unauthorized RMM tools

Law enforcement agencies dismantled key malware infrastructures in "Operation Endgame" last May. This led to a decline in IAB activity, prompting attackers to increasingly rely on social engineering tactics, particularly phone-based attacks (TOAD). Known threat actors such as TA583 and TA2725 are deliberately targeting RMM tools to gain unauthorized initial access to networks.

To protect themselves, companies should restrict the use of unauthorized RMM software, identify suspicious activity through network and endpoint detection, and educate employees about social engineering attacks. Because RMM tools often appear legitimate, targeted security measures are essential to prevent their misuse.

Advertising
Go directly to the analysis on Proofpoint.com

 


About Proofpoint

Proofpoint, Inc. is a leading cybersecurity company. The focus for Proofpoint is the protection of employees. Because these mean the greatest capital for a company, but also the greatest risk. With an integrated suite of cloud-based cybersecurity solutions, Proofpoint helps organizations around the world stop targeted threats, protect their data, and educate enterprise IT users about the risks of cyberattacks.


 

Matching articles on the topic

MITRE CVE program remains in place for the time being

The CVE program, funded by the US government, is considered a crucial component in the global detection of software flaws. Now, funding is to be temporarily suspended. ➡ Read more

LockBit leak site hacked and data stolen

Now LockBit has also become the victim of another hacker: It seems that not only the leak page of the group was hacked, but ➡ Read more

F5 BIG-IP: BSI warns of highly dangerous vulnerabilities

The BSI has issued a warning about F5 products, as they contain several highly dangerous security vulnerabilities that should be closed. The BIG-IP ➡ Read more

Iran, North Korea, Russia: State hackers rely on ClickFix 

State-sponsored hacker groups are increasingly adopting new social engineering techniques originally developed by commercially motivated cybercriminals. ClickFix, for example, is now increasingly ➡ Read more

TA4557: Venom Spider targets HR departments

TA4557, better known as Venom Spider, is increasingly exploiting phishing and trying to deploy its backdoor malware. The focus of the ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Oettinger Brewery attacked by ransomware

The APT group Ransomhouse claims to have successfully attacked the German brewery Oettinger with ransomware. On the APT group's leak page ➡ Read more

Healthcare facilities: 90 percent are at high risk

The current report “State of CPS Security: Healthcare Exposures 2025” shows the most dangerous vulnerabilities of medical devices in networks of ➡ Read more