Surge in RMM Abuse as Hackers Shift Away from Traditional Malware

Related

CISOs to Watch in California’s Utilities Industry

California’s utilities sector depends on CISOs who can protect...

Cybersecurity Leaders to Watch in California’s Retail Industry

California’s retail sector depends on cybersecurity leaders who can...

Cybersecurity Leaders to Watch in California’s Transportation & Logistics Industry

California’s transportation infrastructure depends on organizations that move people,...

FBI Says Americans Lost a Record $21 Billion to Cybercrime in 2025

What happened Americans lost a record $21 billion to cybercrime...

Share

What happened

Cybersecurity researchers report a significant increase in threat actors abusing legitimate Remote Monitoring and Management (RMM) software instead of deploying traditional malware. Last year, malicious use of RMM tools rose by 277% year-over-year, with attackers leveraging these enterprise-trusted platforms to blend in with normal network activity and evade detection.

Who is affected

Organizations across all sectors saw increased RMM abuses, with the healthcare and technology industries experiencing particularly notable upticks. Commonly abused RMM products include ConnectWise ScreenConnect, AnyDesk, Atera, NetSupport, PDQ Connect, and SplashTop.

Why CISOs should care

This trend signals a shift in adversary tactics: instead of relying on standalone malware, attackers are weaponizing tools already present in enterprise environments. Because RMM software is widely trusted and frequently used for legitimate IT administration, malicious activity can be difficult to distinguish from normal operations, increasing dwell time and the potential for credential theft, lateral movement, and broader compromise.

3 practical actions

  1. Inventory and restrict RMM tools: Continuously audit all RMM deployments and ensure only authorized, secure versions are permitted to run with strict access controls.
  2. Strengthen monitoring and alerting: Implement robust telemetry and alerting for anomalous RMM usage patterns, including unusual login sources, elevated privileges, or off-hours activity.
  3. Harden access controls: Enforce multifactor authentication (MFA), least-privilege access, and network segmentation around RMM systems to limit opportunities for misuse.