Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Top 5 Remote-Access And RMM Tools Most Abused By Threat Actors 

Posted on July 9, 2025July 9, 2025 By CWS

Distant monitoring and administration (RMM) instruments are a go-to for IT groups, however that very same energy makes them a favourite trick up attackers’ sleeves, too.

Within the first half of 2025, ANY.RUN analysts reviewed 1000’s of real-world malware detonations within the interactive sandbox and noticed a transparent development: 5 instruments have been concerned in most RMM-related intrusions. 

Let’s take a more in-depth take a look at the 5 RMM instruments mostly exploited by attackers, and the way your group can spot this exercise sooner, earlier than it turns into one thing extra severe.

In the event you work in a SOC or deal with incident response, that is the form of sample value being attentive to. 

Snapshot of the Knowledge 

This breakdown displays the frequency of every RMM instrument noticed throughout suspicious and malicious sandbox classes within the first half of 2025.

The numbers are drawn from ANY.RUN’s inner tagging system, which tracks instrument utilization patterns in actual time.

It’s a fast technique to see which platforms stood out in attacker exercise and the way usually they appeared in precise malware investigations. 

1. ScreenConnect: 3,829 Sandbox Periods 

ScreenConnect (now branded as ConnectWise Management) is a reliable distant assist and desktop entry instrument utilized by IT groups and MSPs.

Sadly, its highly effective distant management options additionally make it a straightforward selection for menace actors seeking to silently entry and handle compromised machines. 

Within the following sandbox session, we will clearly see how ScreenConnect is utilized in a phishing marketing campaign that mimics a Zoom assembly hyperlink: 

View sandbox session 

Evaluation session with the exploitation of ScreenConnect 

The quickest technique to catch threats like that is by interactive sandboxes like ANY.RUN.

Within the top-right panel of the session, the platform instantly flags the exercise as Malicious, assigning clear behavioral tags corresponding to “screenconnect”, “rmm-tool”, and “distant”. 

Quick verdict of malicious exercise displayed inside ANY.RUN sandbox with related labels 

The method tree highlights the malicious executable (ScreenConnect.WindowsClient.exe) and supplies wealthy context just like the command line, YARA detections, and extra, saving your time and guesswork. 

Reduce investigation time, scale back alert fatigue, and catch hidden threats sooner with ANY.RUN’s interactive sandbox -> Strive ANY.RUN now 

Relatively than digging by logs or counting on static detection, this real-time visibility helps groups spot abuse early, even when attackers use reliable instruments. 

Particulars of malicious course of 

2. UltraVNC: 2,117 Sandbox Periods 

UltraVNC is an open-source distant desktop instrument usually utilized by IT assist groups to view and management one other pc over a community. It’s light-weight, free, and simple to configure. 

Within the sandbox session under, UltraVNC is used as a part of an Agent Tesla marketing campaign.  

View sandbox session 

Use of UltraVNC in an assault with Agent Tesla 

ANY.RUN’s interactive sandbox flags the conduct immediately, labeling the session as Malicious and tagging it with “ultravnc”, “rmm-tool”, and “stealer”.

The method tree reveals how RegAsm.exe launches with suspicious conduct and is tied to Agent Tesla exercise, together with credential theft. 

With real-time detection, detailed indicators, and visualized execution stream, ANY.RUN helps analysts shortly join the dots, with out having to reverse engineer each step manually. 

3. NetSupport: 746 Sandbox Periods 

NetSupport Supervisor is a reliable distant entry instrument usually utilized in company and academic settings. However when deployed from uncommon places and with out consumer consent, it’s a crimson flag.

Attackers generally use it as a stealthy Distant Entry Trojan (RAT) because of its built-in capabilities for display screen viewing, file switch, and command execution. 

Within the sandbox session under, the assault begins with a textual content file containing obfuscated PowerShell code, which triggers the execution of client32.exe; a NetSupport binary dropped into the consumer’s roaming profile: 

View sandbox session 

NetSupport exploitation detected inside ANY.RUN’s interactive sandbox 

The method tree reveals client32.exe operating from: C:UsersadminAppDataRoamingbDabSkclient32.exe. This can be a typical location utilized by malware to keep away from detection. 

Malicious course of with its particulars displayed inside ANY.RUN sandbox 

Beneath, within the HTTP request part, we will see a connection to the suspicious area geo.netsupportsoftware.com, confirming the usage of NetSupport for command-and-control.

Mixed with POST visitors to a pretend C2 server, this conduct helps analysts join the dots shortly and confidently. 

HTTP request part confirming the usage of NetSupport 

4. PDQ Join: 230 Sandbox Periods 

PDQ Join is a cloud-based system administration instrument that enables IT groups to deploy software program, run scripts, and handle endpoints remotely, while not having area entry.

It’s a goal for abuse in phishing and preliminary entry campaigns. 

Within the sandbox session under, the assault begins with a pretend authorities verification web page; a phishing website trying to lure the sufferer into downloading a malicious payload: 

View sandbox session 

Phishing assault with the exploitation of PDQ Join 

Shortly after the phishing web page masses, we see a suspicious connection from pdq-connect-agent.exe to a distant IP tackle (162.159.141.50) over port 443, as proven within the community stream.

The executable seems alongside a companion updater course of, pdq-connect-updater.exe, hinting at a stealthy set up and command channel. 

Particulars of malicious connections analyzed inside ANY.RUN sandbox 

This type of setup can simply fly below the radar in static or rule-based methods.

However ANY.RUN’s interactive sandbox reveals it in seconds, highlighting the precise course of that makes the outbound request and giving analysts the complete image of what’s taking place, from the pretend CAPTCHA to the stay community exercise. 

5. Atera: 171 Sandbox Periods 

Atera is a distant monitoring and administration (RMM) platform designed for IT professionals to remotely handle methods, automate upkeep, and monitor efficiency.

Like different reliable instruments, it may be quietly put in and misused by attackers for persistence and management, usually with out triggering alarms. 

Within the sandbox session under, the file AteraAgent.exe runs from its default listing however triggers a number of warnings associated to system service execution, file overwrites, and suspicious course of conduct: 

View sandbox session 

ANY.RUN’s detection engine assigns a Malicious verdict.

The method drops or overwrites executable content material and begins SC.EXE to register itself as a Home windows service; frequent conduct in stealthy persistence setups. 

Agent Atera course of with related TTPS 

Beneath within the Risk Particulars tab, we additionally see an outbound connection to agent-api.atera.com, flagged as a Potential Company Privateness Violation.

This detection (by way of Suricata IDS) confirms that the Atera agent is actively speaking with distant infrastructure, whether or not the consumer is aware of it or not. 

Communication with the distant entry software program 

With this degree of visibility, groups can shortly spot when a trusted utility crosses the road into unauthorized use and take motion earlier than deeper compromise happens. 

Detect Abuse Early And Reply With Confidence 

RMM instruments aren’t going away however with the precise visibility your group doesn’t need to be caught off guard once they’re used in opposition to you.

ANY.RUN helps safety groups catch misuse sooner, examine smarter, and make higher choices with context-rich, real-time evaluation. 

From prompt verdicts and detailed behavioral tags to community forensics and assault mapping, ANY.RUN provides analysts the options they should keep forward, with out digging by logs or relying solely on static detections.

Whether or not you’re working in a SOC, operating menace hunts, or investigating incidents, it’s constructed for pace, readability, collaboration, and belief. 

Begin your 14-day trial of ANY.RUN right this moment and see how a lot sooner your group can catch threats hiding in plain sight.      

Cyber Security News Tags:Abused, Actors, RemoteAccess, RMM, Threat, Tools, Top

Post navigation

Previous Post: Reflectiz Now Available on the Datadog Marketplace
Next Post: Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets

Related Posts

Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Cyber Security News
New Blitz Malware Attacking Windows Servers to Deploy Monero Miner Cyber Security News
Top 3 Evasion Techniques In Phishing Attacks: Real Examples Inside  Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
Healthcare Sector Emerges as a Prime Target for Cyber Attacks in 2025 Cyber Security News
WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs
  • McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data
  • Microsoft Confirms Teams Outage for Users, Investigation Underway
  • How to Manage Security Patches in Organizations
  • Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs
  • McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data
  • Microsoft Confirms Teams Outage for Users, Investigation Underway
  • How to Manage Security Patches in Organizations
  • Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News