“tales of too many rmms in a highly interconnected world, remote monitoring and management ( rmm ) tools are critical to reducing cost and increasing efficiencies. however, these tools pose challenges and even significant risk if not properly managed. huntress analysts have observ…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
98%
“that did not have a huntress agent installed, and was therefore not being managed via the huntress soc. the threat actor moved laterally between the endpoints via rdp, and within minutes of accessing the reported endpoint, installed the chrome remote desktop host, rustdesk, and a…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
95%
“may not have been executed, as the threat actor ’ s activities were thwarted before they got to that point in their attack. in this incident, the threat actor gained access to an endpoint via a legacy rmm, and installed another rmm tool while retaining access to the original init…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
88%
“that did not have a huntress agent installed, and was therefore not being managed via the huntress soc. the threat actor moved laterally between the endpoints via rdp, and within minutes of accessing the reported endpoint, installed the chrome remote desktop host, rustdesk, and a…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
86%
“##connectivity across any enterprise environment. however, this is more particularly the case within the managed services provider ( msp ) and managed detection and response ( mdr ) space. for example, huntress has responded to incidents where the means of initial access was achi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
56%
“may not have been executed, as the threat actor ’ s activities were thwarted before they got to that point in their attack. in this incident, the threat actor gained access to an endpoint via a legacy rmm, and installed another rmm tool while retaining access to the original init…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
46%
“that did not have a huntress agent installed, and was therefore not being managed via the huntress soc. the threat actor moved laterally between the endpoints via rdp, and within minutes of accessing the reported endpoint, installed the chrome remote desktop host, rustdesk, and a…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
42%
“may not have been executed, as the threat actor ’ s activities were thwarted before they got to that point in their attack. in this incident, the threat actor gained access to an endpoint via a legacy rmm, and installed another rmm tool while retaining access to the original init…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1110.004Credential Stuffing
32%
“/ rpc or the mssql instance to enable rdp or to install other rmm tools. incident 1 during an incident identified on 7 feb 2025, evidence indicated that ultravnc had been installed on 14 may 2023, and that since that time, it had been subject to brute force password guessing atta…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1080Taint Shared Content
31%
“that did not have a huntress agent installed, and was therefore not being managed via the huntress soc. the threat actor moved laterally between the endpoints via rdp, and within minutes of accessing the reported endpoint, installed the chrome remote desktop host, rustdesk, and a…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
In a highly interconnected world, remote monitoring and management (RMM) tools are critical to reducing cost and increasing efficiencies. However, these tools pose challenges and even significant risk if not properly managed.