Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Hackers Target ScreenConnect Features For Network Intrusions
News

Hackers Target ScreenConnect Features For Network Intrusions

Team-CWDBy Team-CWDOctober 13, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A rise in cyber-attacks exploiting remote monitoring and management (RMM) tools for initial access via phishing has been observed by cybersecurity researchers.

According to the new findings from the DarkAtlas research project, advanced persistent threat (APT) groups are abusing popular RMM platforms, including AnyDesk, ConnectWise ScreenConnect and Atera, to gain unauthorized control of systems.

While AnyDesk has become easier to detect, leading many attackers to move away from it, ScreenConnect has recently gained traction among adversaries.

Developed by ConnectWise, ScreenConnect is designed to let IT administrators deploy tasks, manage devices and provide remote support across multiple operating systems, including Windows, macOS, Linux, iOS and Android.

The researchers found that threat actors are exploiting ScreenConnect’s legitimate features, such as unattended access, VPN functionality, REST API integration and file transfer, to establish persistence and move laterally within compromised networks.

How Attackers Abuse ScreenConnect

During installation, the ScreenConnect client runs mainly in memory, leaving few traces on disk and evading basic antivirus scans.

The research noted that attackers use the platform’s management console to generate custom URLs or invite links – tools originally meant to simplify remote access. These links are often repurposed for phishing, luring victims into unknowingly installing malicious ScreenConnect clients.

Once deployed, the client binary, commonly named ScreenConnect.WindowsClient.exe, registers as a Windows service, providing persistent remote connectivity.

Investigators also found that configuration files such as user.config and system.config store hostnames, IP mappings and encrypted keys, which can be used to trace connections to suspicious domains.

Read more on remote access tool exploitation: Phishing Campaigns Drop RMM Tools for Remote Access

Implications For Defenders

The DarkAtlas research identified key event logs generated by ScreenConnect during operation, including Security Event ID 4573 and Application Log events 100 and 101.

These provide valuable indicators for digital forensics and incident response teams. Interestingly, chat data between operators and victims is not stored on disk but in memory, making memory acquisition essential during investigations.

The report concludes that the strengths of ScreenConnect as a legitimate RMM platform – its flexibility and broad system access – are also what makes it so appealing to attackers.

To counter these threats, defenders should closely monitor:

As the DarkAtlas research emphasized, understanding and detecting these subtle signs of ScreenConnect misuse is vital for effective digital forensics and incident response (DFIR) and threat hunting.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOne Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
Next Article Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Look out for phony verification pages spreading malware

September 14, 2025

Chronology of a Skype attack

February 5, 2026

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.