Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Phishing Campaigns Drop RMM Tools for Remote Access
News

Phishing Campaigns Drop RMM Tools for Remote Access

Team-CWDBy Team-CWDSeptember 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Malicious actors are using multiple lures in new phishing campaigns designed to install remote monitoring and management (RMM) software onto victim machines, Red Canary has warned.

The Zscaler company explained in a blog post on Friday that it had observed several campaigns that abuse the ITarian (aka Comodo), PDQ, SimpleHelp and Atera tool for covert remote access.

It pointed to four specific lures:

  • A fake browser update that the victim is redirected to after visiting an infected website. Once the user clicks on a “Update Chrome” button, they unwittingly download the ITarian RMM Microsoft Installer (MSI)
  • A meeting invite, where victims are presented with fake meeting software installers such as Microsoft Teams and Zoom Installer. The end goal is to install either the Atera, PDQ or ScreenConnect RMM tool
  • A party invitation, usually sent via email, with the lure of “Party Card Viewer” or “E-Invite.” An Atera RMM tool is delivered through a Cloudflare R2 object storage domain, which is trusted by the victim’s computer
  • Government forms, such as Social Security statements, W9 forms and income tax returns. If the victim clicks through, they will begin an install of PDQ Connect, SimpleHelp or ScreenConnect. In some examples the adversary installs multiple RMM tools in quick succession

Read more on RMM threats: Ransomware Gang Exploits SimpleHelp RMM to Compromise Utility Billing Firm

Red Canary warned that RMM software could be used by threat actors to launch ransomware or data theft attacks.

“Given the relative ease with which realistic looking phishing emails and websites can be created, it is vital for organizations to implement security controls and detection capabilities,” it added.

“Implementing network controls like browser isolation or monitoring for suspicious newly registered domains can help identify and contain these compromises at their earliest stages.”

The security vendor urged enterprise security teams to mitigate the threat by:

  • Deploying detection and response at the endpoint layer
  • Maintaining an “approved tools list” and denying access to anything unauthorized
  • Improving network visibility via preventive or monitoring controls for trusted services like Cloudflare R2 object storage domains. This could include enforcing browser isolation when domains deliver files with suspicious extensions or monitoring for suspicious newly registered domains

“To determine if a RMM tool is being used maliciously, it’s essential to understand its baseline of normal behavior,” Red Canary concluded.

“Key indicators of malicious activity often include changing the filename, downloading and running the tool from a non-standard directory, downloading an RMM installer from a domain not connected to the RMM product or initiating suspicious network connections.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDrift Breach Chaos, Zero-Days Active, Patch Warnings, Smarter Threats & More
Next Article GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms
Team-CWD
  • Website

Related Posts

News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026
News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Find your weak spots before attackers do

November 21, 2025

What it is and how to protect yourself

January 8, 2026

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.