Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Campaign Exploits RMM Tools in 80+ Organizations

Phishing Campaign Exploits RMM Tools in 80+ Organizations

Posted on May 4, 2026 By CWS

An ongoing phishing operation has been identified as targeting a diverse range of organizations since April 2025. The campaign utilizes Remote Monitoring and Management (RMM) software to maintain stealthy access to compromised systems, cybersecurity experts revealed.

Dubbed VENOMOUS#HELPER by Securonix, this campaign has affected over 80 organizations, primarily within the United States. It shares characteristics with previously documented clusters by Red Canary and Sophos, the latter referring to it as STAC6405. Although the perpetrators remain unidentified, the tactics suggest involvement by financially motivated Initial Access Brokers or ransomware actors.

Exploiting Legitimate Software for Access

The attackers employ customized versions of SimpleHelp and ScreenConnect RMM tools to circumvent security measures, leveraging their legitimate appearance to deceive targets. This strategy aims to construct a dual-channel access system, ensuring continuous operation even if one channel is shut down.

The attack commences with phishing emails masquerading as communications from the U.S. Social Security Administration (SSA), urging recipients to verify their email and download an SSA statement via a link. This link directs users to a compromised Mexican business website, gruta.com.mx, to bypass spam filters.

Technical Execution and Persistence

Once the SSA statement is ‘downloaded’ from another attacker-controlled domain, it delivers the SimpleHelp RMM tool through a seemingly innocuous executable. This executable installs itself as a Windows service, persistently maintaining operation by employing a watchdog mechanism that restarts the malware if terminated.

The SimpleHelp client escalates privileges using SeDebugPrivilege, and a legitimate executable, elev_win.exe, to attain SYSTEM-level access. This allows the threat actor to monitor desktops, inject keystrokes, and interact with user resources. Should the SimpleHelp channel be disrupted, ConnectWise ScreenConnect serves as an alternative communication path.

Implications for Security and Future Outlook

The SimpleHelp version 5.0.1 deployed in these attacks provides extensive remote administration capabilities, leaving victim organizations vulnerable to ongoing exploitation. Attackers can execute commands, transfer files, and infiltrate adjacent systems, all while evading detection due to the software’s legitimate signatures.

This campaign highlights the challenges faced by security teams in detecting and mitigating threats that misuse authentic tools. Organizations must enhance their defensive strategies and remain vigilant against such sophisticated attacks.

The Hacker News Tags:cyber attack, Cybersecurity, endpoint security, Malware, network security, Phishing, remote access, RMM tools, ScreenConnect, SimpleHelp

Post navigation

Previous Post: DigiCert Breach Exposes EV Code Signing Vulnerabilities
Next Post: Cisco Acquires Astrix Security for Non-Human Identity Protection

Related Posts

AI Browsers Vulnerable to Phishing Attacks: A Security Concern AI Browsers Vulnerable to Phishing Attacks: A Security Concern The Hacker News
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera The Hacker News
Secure Vibe Coding: The Complete New Guide Secure Vibe Coding: The Complete New Guide The Hacker News
Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More The Hacker News
The Future of Cybersecurity Includes Non-Human Employees The Future of Cybersecurity Includes Non-Human Employees The Hacker News
Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs Stealthy DEAD#VAX Malware Uses AsyncRAT via IPFS VHDs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SAP npm Packages Exploited in Major Credential Theft
  • Cisco Acquires Astrix Security for Non-Human Identity Protection
  • Phishing Campaign Exploits RMM Tools in 80+ Organizations
  • DigiCert Breach Exposes EV Code Signing Vulnerabilities
  • Trellix Investigates Source Code Repository Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SAP npm Packages Exploited in Major Credential Theft
  • Cisco Acquires Astrix Security for Non-Human Identity Protection
  • Phishing Campaign Exploits RMM Tools in 80+ Organizations
  • DigiCert Breach Exposes EV Code Signing Vulnerabilities
  • Trellix Investigates Source Code Repository Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark