TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

A Series of Unfortunate (RMM) Events

2025-12-18 · Read original ↗

ATT&CK techniques detected

13 predictions
T1219Remote Access Tools
99%
“a series of unfortunate ( rmm ) events at this point, it ’ s no secret that threat actors are abusing remote monitoring and management ( rmm ) tools in their attacks for access to and persistence in victim environments. while businesses use rmms to increase efficiencies and reduc…”
T1219Remote Access Tools
98%
“remote access \ jwappssharedconfig \ serviceconfig. xml this rogue simplehelp rmm was installed in the path : c : \ programdata \ jwrapper - remote access \ jwappssharedconfig \ restricted \ simpleservice. exe figure 3 : process tree showing the attack that involved both pdq and …”
T1219Remote Access Tools
97%
“in the attack, stopping the threat actor from escalating any further. a longer chain of rmm downloads in october, huntress observed a user at a car dealer execute the file openinvitation. exe, which is a rogue goto resolve rmm installer. the file was downloaded from the domain ab…”
T1219Remote Access Tools
95%
“check logs for instances where rmms were executed to weed out suspicious rmm use the incidents that we ' ve outlined above are only a small fraction of the cases that the huntress soc team experiences daily when it comes to rogue rmm deployments. the soc sees not only individual …”
T1219Remote Access Tools
94%
“to discern what stems from end user behavior versus what is malicious. this is where the value of a managed soc can help : soc analysts look at indicators like where instances are calling out to, where they ’ re being installed on the system, and how they ’ re being installed. fo…”
T1219Remote Access Tools
93%
“continuously reassess past and present telemetries. for this specific case, we worked with the business to neutralize the rogue rmms. pdq to simplehelp instance we ’ ve seen multiple instances that start with the installation of pdq, and then use a secondary rmm in the next phase…”
T1219Remote Access Tools
90%
“fourth ) rmm tool can help ensure longer term access, even if the first tool is blocked. below are a few examples of what our soc is seeing, including some of the popular social engineering lures that threat actors are using to trick victims into downloading rogue rmms, and the u…”
T1219Remote Access Tools
87%
“to infect the victim with another rmm, screenconnect, via the file path : c : \ program files ( x86 ) \ screenconnect client ( fdeeb5df8057eef0 ) \ screenconnect. clientservice. exe a search for the screenconnect binary ( f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d39…”
T1219Remote Access Tools
86%
“user ’ s chrome browser history showed that the installer was downloaded from ssaaccount - helper [. ] icu. figure 4 shows that the lure linked to this domain had to do with a purported social security account statement. once the victim clicked “ download ssa documents, ” it kick…”
T1219Remote Access Tools
72%
“##ct client ( 2f193a6e5e15c3cc ) \ figure 5 : the threat actor used goto resolve, screenconnect, and simplehelp in one attack at this point, huntress soc analysts caught and stopped the threat actor before they could deploy any further processes or persistence mechanisms. continu…”
T1219Remote Access Tools
70%
“( a classic ) : fake invitations are a popular type of lure used by threat actors, which we have seen across many different rogue rmm incidents. on november 3, a user was tricked into executing eviteinvitersolvelist. exe, which was actually a malicious goto resolve installer. int…”
T1204.002Malicious File
49%
“##778bf91 [. ] r2 [. ] dev / thanksgiving - iv. exe. the malicious rmm then deployed a rogue screenconnect installer into the directoryc : \ program files ( x86 ) \ screenconnect client ( 3bf4055180e70e5b ), which was configured for the domainwilkensealsivc [. ] shop. - the fake …”
T1204.002Malicious File
40%
“user ’ s chrome browser history showed that the installer was downloaded from ssaaccount - helper [. ] icu. figure 4 shows that the lure linked to this domain had to do with a purported social security account statement. once the victim clicked “ download ssa documents, ” it kick…”

Summary

Recently, the Huntress SOC has observed threat actors increasingly use PDQ and GoTo Resolve to deploy further remote monitoring and management (RMM) tools in attacks.