Remote Monitoring and Management (RMM) tools are a vital part of modern IT operations. They help organizations increase efficiency, reduce costs, and manage endpoints remotely. Unfortunately, threat actors have also recognized their value. Over the past year, attackers have increasingly abused both legitimate and rogue RMM tools to gain access, maintain persistence, and execute malicious actions in victim environments.
Recent incidents observed by Huntress highlight a concerning trend: multi-stage attack chains that involve the use of multiple RMM tools, including ScreenConnect, GoTo Resolve, SimpleHelp, TeamViewer, and more. These campaigns often start with phishing or social engineering, then pivot to deploying secondary (or even tertiary) RMMs to ensure that threat actors retain access even if the first tool is removed.
ThreatSTOP’s proactive protections are specifically designed to prevent this type of activity before attackers can establish a foothold in your environment. Our customers frequently report attempts at “shadow IT” access, and AnyDesk consistently ranks as the most common target.
Huntress research shows that threat actors are increasingly chaining RMMs for layered persistence. A common attack sequence involves:
Some notable patterns include:
These attacks are dangerous because rogue RMMs can appear legitimate, making it difficult for traditional monitoring to distinguish between authorized and malicious activity.
ThreatSTOP provides Protective DNS and IP-based protections that can prevent rogue RMM activity before it impacts your network:
Our Security, Intelligence, and Research team continuously monitors for threats like:
By applying ThreatSTOP’s proactive protections across your DNS and network infrastructure, you can prevent these threats even if an endpoint is tricked into running a rogue installer.
Proactive protection is critical in an age where attackers exploit the very tools you trust. ThreatSTOP provides comprehensive coverage for ScreenConnect and other abused RMM platforms, reducing your risk of compromise and persistence-based attacks. Allow the RMMs you authorize on your network, and block the rest.
For those interested in joining the ThreatSTOP family, or to learn more about our proactive protections for all environments, we invite you to visit our product page. Discover how our solutions can make a significant difference in your digital security landscape. We have pricing for all sizes of customers! Get started with a Demo today!
Connect with Customers, Disconnect from Risks
MITRE ATT&CK Mapping for Rogue RMM Coverage
|
Tactic |
Technique |
ThreatSTOP Mitigation |
|
Initial Access |
T1566.001: Phishing Attachment |
Blocks malicious domains via DNS/IP Defense |
|
Execution |
T1204.002: User Execution of Malicious File |
Disrupts download of rogue RMM installers |
|
Persistence |
T1053: Scheduled Task Creation |
Stops C2 communications for persistence |
|
Command and Control |
T1071.004: Application Layer Protocol (Web) |
Blocks ScreenConnect and SimpleHelp C2 traffic |
|
Exfiltration & Lateral Move |
T1041: Exfiltration Over C2 Channel |
Cuts off outbound traffic to attacker servers |