Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools

Posted on January 27, 2026January 27, 2026 By CWS

Cybercriminals are more and more distributing malicious Distant Monitoring and Administration (RMM) instruments by way of faux web sites that mimic well-liked software program obtain pages.

These misleading websites impersonate legit utilities like Notepad++ and 7-Zip, tricking customers into putting in distant entry instruments reminiscent of LogMeIn Resolve as a substitute of the software program they supposed to obtain.

As soon as put in, these RMM instruments permit attackers to grab full management of contaminated programs, execute instructions remotely, and deploy extra malware payloads like PatoRAT.

The assault begins when customers land on fraudulent obtain pages, typically by way of commercials or search engine manipulation.

These web sites carefully replicate the looks and format of official software program distribution websites, making detection tough for common customers.

When guests try and obtain Notepad++ or 7-Zip, the faux websites ship LogMeIn Resolve or PDQ Join—legit distant administration instruments that attackers repurpose for malicious goals.

These instruments register with their respective infrastructures upon set up, establishing a persistent connection that risk actors exploit to keep up entry.

ASEC analysts recognized a big improve in assaults leveraging RMM instruments in the course of the preliminary an infection part.

In contrast to conventional malware, these legit distant management purposes typically evade detection by antivirus software program, presenting a critical problem for safety groups.

Camouflage utility obtain web page (Supply – ASEC)

The researchers documented instances the place attackers deployed each LogMeIn Resolve and PDQ Hook up with execute PowerShell instructions and set up backdoor malware, creating a number of pathways for system compromise and information theft.

An infection Mechanism and Distant Entry Deployment

The an infection course of depends on social engineering ways that exploit consumer belief in acquainted software program manufacturers. Pretend web sites show convincing obtain buttons, model numbers, and set up choices that mirror legit pages.

When customers execute the downloaded installer, they unknowingly set up LogMeIn Resolve or PDQ Join as a substitute of the anticipated utility.

These RMM instruments supply options reminiscent of distant help, patch administration, and system monitoring—capabilities designed for IT directors however weaponized by attackers for unauthorized entry.

After set up completes, the RMM instruments register with their cloud-based administration infrastructure, enabling attackers to attach remotely with out extra authentication.

The risk actors then execute PowerShell instructions by way of the RMM interface to obtain and set up PatoRAT, a backdoor that gives persistent entry even when the RMM device is later eliminated.

This multi-stage strategy ensures continued management over compromised programs and permits attackers to deploy ransomware, steal credentials, or set up footholds in company networks.

Malware set up log utilizing PDQ Join (Supply – ASEC)

Customers ought to solely obtain software program from official web sites and confirm digital signatures and certificates earlier than set up.

Organizations ought to implement endpoint detection and response options able to monitoring RMM device exercise and figuring out suspicious distant entry patterns that point out potential compromise.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:7Zip, Actors, Deploy, Fake, Monitoring, Notepad, Remote, Threat, Tools, Websites

Post navigation

Previous Post: Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks
Next Post: Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation

Related Posts

Multiple 0-days to Bypass BitLocker and Extract All Protected Data Cyber Security News
Critical Samba RCE Vulnerability Enables Arbitrary Code Execution Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
TaskHound Tool – Detects Windows Scheduled Tasks Running with Elevated Privileges and Stored Credentials Cyber Security News
Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10 Cyber Security News
A Free Zero Trust Web Application Firewall for 2026 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks
  • Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation
  • Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools
  • Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks
  • New Lawsuit Claims that Meta Can Read All the WhatsApp Users Messages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Patches Office Zero-Day Likely Exploited in Targeted Attacks
  • Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation
  • Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools
  • Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks
  • New Lawsuit Claims that Meta Can Read All the WhatsApp Users Messages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark