Fake Notepad++ and 7-Zip Websites Delivered Legitimate RMM Tools for Remote Control and PatoRAT Deployment

Related

Female Cybersecurity Leaders to Watch in Nevada

Nevada’s cybersecurity leadership bench reflects the state’s distinctive mix...

Female Cybersecurity Leaders to Watch in Louisiana

Louisiana’s cybersecurity leadership bench reflects a mix of banking,...

Female Cybersecurity Leaders to Watch in South Carolina

South Carolina’s cybersecurity leadership bench reflects a mix of...

Female Cybersecurity Leaders to Watch in Oregon

Oregon’s cybersecurity leadership bench reflects a mix of enterprise...

Female Cybersecurity Leaders to Watch in Missouri

Missouri’s cybersecurity leadership bench reflects a mix of higher...

Share

What happened

The fake Notepad++ and 7-Zip distribution campaign used fraudulent websites that mimicked legitimate download pages to trick users into installing remote monitoring and management tools. Threat actors drove traffic to these spoofed sites through advertisements or search engine manipulation, presenting pages that closely replicated official software distribution layouts. When users attempted to download Notepad++ or 7-Zip, the sites instead delivered legitimate RMM software such as LogMeIn Resolve and PDQ Connect. Once installed, these tools registered with their normal infrastructures and provided attackers remote control capabilities, including remote command execution. ASEC analysts reported an increase in attacks using RMM tools as the initial access mechanism and documented cases where attackers used the installed RMM to execute PowerShell commands and deploy additional malware, including PatoRAT, creating multiple avenues for compromise and data theft.

Who is affected

End users and organizations whose employees download software from unofficial sources are directly affected if RMM tools are installed. Exposure is direct on infected endpoints and indirect if remote access enables attackers to move laterally within enterprise networks.

Why CISOs should care

Using legitimate RMM software for initial access can bypass traditional malware defenses and blends into expected administrative activity, complicating detection and response. The tactic can accelerate hands-on-keyboard intrusion, persistence, and staged malware deployment while leveraging trusted infrastructure.

3 practical actions

  • Restrict unauthorized RMM tooling: Block or require explicit approval for LogMeIn Resolve, PDQ Connect, and similar tools via application control and EDR policy.

  • Enforce trusted software acquisition: Require installs only from verified vendor channels and implement browser/DNS controls to reduce exposure to spoofed download domains.

  • Monitor for suspicious RMM onboarding: Alert on new RMM agent registrations, unusual PowerShell execution via RMM sessions, and unexpected remote control activity on user endpoints.