#rmm-abuse

[ follow ]
#phishing
fromThe Hacker News
6 days ago
Information security

Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access

Attackers use stolen credentials and legitimate RMM software to create persistent, stealthy backdoors by phishing for logins and deploying signed binaries.
fromTechzine Global
1 week ago
Information security

Skeleton Key campaign exploits trusted RMM tools

Attackers hijack legitimate remote monitoring and management (RMM) tools, using stolen credentials and signed enterprise software to maintain stealthy persistent backdoors.
Information security
fromwww.techzine.eu
2 months ago

RMM software: a new weapon in the fight against cargo theft

Cybercriminals exploit RMM tools via compromised freight accounts to manipulate bookings, steal cargo, and resell goods, targeting logistics operations worldwide.
fromIT Pro
5 months ago

Watch out for fake Zoom invites - hackers are abusing ConnectWise ScreenConnect to take over devices

To manipulate targets into engaging and downloading ScreenConnect, the attackers employ advanced deception techniques built around impressive impersonations and familiar business contexts, effectively creating workflows that align with end-user expectations,
Information security
[ Load more ]