Surge in RMM Abuse as Hackers Shift Away from Traditional Malware

Related

JDownloader Website Hacked to Replace Installers With Python RAT Malware

What happened The official JDownloader website was compromised between May...

Attackers Abuse Google Ads and Claude.ai Shared Chats to Push Mac Malware

What happened An active malvertising campaign is abusing Google sponsored...

New TCLBanker Malware Self-Spreads Over WhatsApp and Outlook

What happened Elastic Security Labs has documented a new Brazilian...

Share

What happened

Cybersecurity researchers report a significant increase in threat actors abusing legitimate Remote Monitoring and Management (RMM) software instead of deploying traditional malware. Last year, malicious use of RMM tools rose by 277% year-over-year, with attackers leveraging these enterprise-trusted platforms to blend in with normal network activity and evade detection.

Who is affected

Organizations across all sectors saw increased RMM abuses, with the healthcare and technology industries experiencing particularly notable upticks. Commonly abused RMM products include ConnectWise ScreenConnect, AnyDesk, Atera, NetSupport, PDQ Connect, and SplashTop.

Why CISOs should care

This trend signals a shift in adversary tactics: instead of relying on standalone malware, attackers are weaponizing tools already present in enterprise environments. Because RMM software is widely trusted and frequently used for legitimate IT administration, malicious activity can be difficult to distinguish from normal operations, increasing dwell time and the potential for credential theft, lateral movement, and broader compromise.

3 practical actions

  1. Inventory and restrict RMM tools: Continuously audit all RMM deployments and ensure only authorized, secure versions are permitted to run with strict access controls.
  2. Strengthen monitoring and alerting: Implement robust telemetry and alerting for anomalous RMM usage patterns, including unusual login sources, elevated privileges, or off-hours activity.
  3. Harden access controls: Enforce multifactor authentication (MFA), least-privilege access, and network segmentation around RMM systems to limit opportunities for misuse.
1524023125746
+ posts