Malicious Remote Monitoring and Management (RMM) tools are increasingly being distributed by cybercriminals via phony websites that imitate well-known software download pages. These fraudulent websites pose as trustworthy programs like Notepad++ and 7-Zip, leading users to install remote access tools like LogMeIn Resolve rather than the program they were supposed to download. Learn more Solutions for data security Feeds of threat intelligence News alert hacking Services for penetration testing Plugin for WordPress security Tools for ethical hacking Take advantage of cloud security tools Exploits for computer security Once installed, these RMM tools allow attackers to seize full control of infected systems, execute commands remotely, and deploy additional malware payloads like PatoRAT.
The attack begins when users land on fraudulent download pages, often through advertisements or search engine manipulation.
These websites closely mimic the design and layout of official software distribution websites, making it challenging for regular users to identify them. The phony websites provide LogMeIn Resolve or PDQ Connect, which are legitimate remote management tools that hackers use for nefarious purposes, when users try to download Notepad++ or 7-Zip. Upon installation, these tools register with their corresponding infrastructures, creating a persistent connection that threat actors take advantage of to keep access.
Attacks using RMM tools during the initial infection phase significantly increased, according to ASEC analysts. These trustworthy remote control apps, in contrast to conventional malware, frequently avoid detection by antivirus programs, posing a significant problem for security teams.
Download page for the camouflage utility (Source: ASEC) The researchers recorded instances in which attackers used both PDQ Connect and LogMeIn Resolve to install backdoor malware and run PowerShell commands, opening up several avenues for data theft and system compromise. Deployment of Remote Access and Infection Mechanism Social engineering techniques are used in the infection process to take advantage of users' faith in well-known software brands. Fake websites mimic authentic pages with convincing download buttons, version numbers, and installation options.
Users unintentionally install PDQ Connect or LogMeIn Resolve instead of the intended utility when they run the downloaded installer.
Learn more Tools for digital forensics Solutions for network security Network of Zero Trust Obtain solutions Take Advantage of Cybersecurity Safety Features of the author Protection against phishing Services for penetration testing Software for cybersecurity vulnerability scanning These RMM tools provide features like patch management, system monitoring, and remote support, which are intended for IT administrators but can be used by attackers to gain unauthorized access. The RMM tools register with their cloud-based management infrastructure after installation is finished, allowing attackers to connect remotely without further authentication. The threat actors then download and install PatoRAT, a backdoor that offers continuous access even in the event that the RMM tool is later deleted, by using PowerShell commands via the RMM interface.
In addition to enabling attackers to install ransomware, steal credentials, or gain access to corporate networks, this multi-stage strategy guarantees ongoing control over compromised systems. PDQ Connect's malware installation log (Source: ASEC) Before installing software, users should confirm digital signatures and certificates and only download software from official websites. Endpoint detection and response systems that can track RMM tool activity and spot suspicious remote access patterns that point to possible compromise should be implemented by organizations.
Set CSN as a Preferred Source in Google to Receive More Instant Updates from LinkedIn and X.












.webp%3Fw%3D1068%26resize%3D1068%2C0%26ssl%3D1&w=3840&q=75)