Security researchers warn that attackers are using these trusted administrative tools to blend malicious operations with routine IT management activity, allowing them to bypass many traditional security defenses.
Security researchers from Huntress recently found that threat intelligence shows a dramatic rise in attacks involving RMM software.
Security analysts report that abuse of remote management tools increased by approximately 277% over the past year, accounting for nearly a quarter of observed cybersecurity incidents.
Instead of deploying conventional malware, attackers are building their entire operational playbooks around trusted system administration utilities.
By using legitimate software commonly found in enterprise environments, adversaries can evade endpoint detection systems that typically flag unknown executables or suspicious binaries.
A growing technique involves “daisy‑chaining” multiple remote access tools during an intrusion. In these attacks, one administrative platform is used to deploy another remote control tool, fragmenting security telemetry and complicating detection.
For example, threat actors have been observed abusing vulnerability management software such as Action1 to silently install secondary remote access clients like ScreenConnect using Microsoft Installer (MSI) packages.
Because these deployment packages are legitimately signed, they appear authentic and can easily bypass many security controls.
Researchers also note that lower-skilled attackers are increasingly relying on Large Language Models (LLMs) to generate scripts used during these campaigns.
These scripts automate tasks such as credential harvesting and browser data collection, including attempts to parse browsing histories for cryptocurrency wallets or financial platform logins.
However, many of these AI-generated scripts still show technical limitations. In several observed cases, the scripts failed to properly implement data exfiltration mechanisms, leaving harvested information stored locally on compromised systems instead of being transmitted back to attackers.
Social engineering remains the primary delivery method for these remote access tools. Attackers distribute malicious installers through carefully crafted phishing campaigns designed to trick victims into executing legitimate-looking software.
Common lures include:
Security experts warn organizations to treat any unauthorized remote management installation as a critical security event.
Because these tools are legitimate software, traditional signature-based defenses may fail to detect them.
Recommended defensive measures include:
By improving visibility into remote management software usage and monitoring behavioral anomalies, organizations can significantly reduce the risk posed by this rapidly growing initial access technique.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Hackers Exploit Remote Management Tools to Gain Initial Access to Corporate Networks appeared first on Cyber Security News.
Microsoft Detection and Response Team details a sophisticated voice phishing (vishing) campaign that successfully compromised…
Jacob Drouin, a former Franklin police officer, is suing the city and its police department…
Winnebago County voters said "no" to a new 1% sales tax to fund school improvements,…
ROCKFORD, Ill. (WTVO) — The Community Action Garden grants are now available for all neighborhood,…
Illinois Lt. Gov. Juliana Stratton, backed by Gov. J.B. Pritzker, will face Republican Don Tracy…
The U.S. Capitol on March 3, 2026. (Photo by Jennifer Shutt/States Newsroom)WASHINGTON — U.S. Senate…
This website uses cookies.