Phishing Campaigns Exploit RMM Tools to Target Businesses

Phishing campaigns are increasingly exploiting Remote Monitoring and Management (RMM) tools to infiltrate business networks. Cybercriminals leverage these legitimate IT management platforms to bypass traditional security measures, making their attacks more sophisticated and harder to detect. This trend highlights the evolving tactics of threat actors who use trusted software to deploy malware, steal credentials, and gain persistent access to corporate environments. Organizations must enhance their cybersecurity posture by implementing robust monitoring of RMM tool usage, educating employees about phishing risks, and deploying advanced threat detection solutions. Understanding the methods used in these phishing campaigns is crucial for developing effective defenses and mitigating potential damage. This article delves into recent incidents, the types of RMM tools targeted, and best practices for securing these critical assets against exploitation.

This Cyber News was published on www.infosecurity-magazine.com. Publication date: Mon, 15 Sep 2025 08:30:15 +0000


Cyber News related to Phishing Campaigns Exploit RMM Tools to Target Businesses

10 Best Anti-Phishing Tools in 2025 - What is Good?What Could Be Better?Real-time email threat detection and response using AI and machine learning.Limited customer support optionsAutomates incident response to stop phishing attacks quickly.The training module is not entirely ...
5 months ago Cybersecuritynews.com
The Dangers of Remote Management & Monitoring Tools for Cybersecurity - Remote monitoring and management (RMM) tools are used by business organizations to manage and monitor their enterprise IT infrastructure from a central location. However, the increasing sophistication of hackers and cybercriminals has caused both ...
2 years ago Csoonline.com
20 Best Remote Monitoring Tools - 2025 - What is Good ?What Could Be Better ?Strong abilities to keep an eye on devices and systems.Some parts may take time to figure out.It gives you tools for remote control and troubleshooting.There could be more ways to change things.Lets you automate ...
9 months ago Cybersecuritynews.com
CVE-2023-53649 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
Threat Actors Leverage Several RMM Tools to Expand Attack Surface - Threat actors are increasingly exploiting Remote Monitoring and Management (RMM) tools to broaden their attack surface and enhance their cyberattack capabilities. These tools, originally designed for IT administrators to manage and monitor endpoints ...
4 months ago Cybersecuritynews.com
What SOCs Need to Know About Water Dybbuk - According to the Federal Bureau of Investigation, BEC costs victims more money than ransomware, with an estimated US$2.4 billion being lost to BEC in the US in 2021. Recently, BEC scammers have been using stolen accounts from legitimate Simple Mail ...
2 years ago Trendmicro.com
Cybersecurity Awareness Campaigns in Education - Cybersecurity awareness campaigns in education are essential to protect digital systems and information. The target audience for cybersecurity awareness campaigns in education includes students, teachers, administrators, and other staff members. ...
2 years ago Securityzap.com
Spear Phishing vs Phishing: What Are The Main Differences? - Almost half of them used phishing to obtain the passwords of users. Highly targeted phishing campaigns against specific individuals or types of individuals are known as spear phishing. It's important to be able to spot phishing in general. For ...
1 year ago Techrepublic.com
New Spam Campaign Abuses Remote Monitoring Tools to Attack Organizations - A sophisticated spam campaign targeting Brazilian organizations has emerged, exploiting legitimate Remote Monitoring and Management (RMM) tools to gain unauthorized access to corporate networks. The campaign primarily targets Brazil now, but security ...
8 months ago Cybersecuritynews.com
Flipping the BEC funnel: Phishing in the age of GenAI - For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic email and fire it out to thousands of recipients in the hope that a few might take the bait. Common among these new techniques was a shift towards ...
2 years ago Helpnetsecurity.com
Threat Actors Leverage RMM Tools to Expand Attack Surfaces - Remote Monitoring and Management (RMM) tools are increasingly exploited by cyber threat actors to infiltrate corporate networks and expand their attack surfaces. These tools, designed for IT administrators to remotely manage endpoints, provide ...
2 months ago Cybersecuritynews.com CVE-2023-27350 CVE-2023-27351 Lazarus Group FIN7
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
1 year ago Securityzap.com
Hackers Leveraging RMM Tools To Maintain Persistence To Infiltrate And Move Through Networks - Cybersecurity experts have identified a persistent trend of threat actors exploiting legitimate remote monitoring and management (RMM) software to infiltrate networks, maintain access, and facilitate lateral movement. These legitimate tools, which ...
10 months ago Cybersecuritynews.com
Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations - WithSecure analysts identified this campaign through pattern analysis of PDF metadata and delivery mechanisms, noting the consistent use of embedded direct download links pointing to legitimate RMM vendor platforms. A sophisticated cyber campaign ...
5 months ago Cybersecuritynews.com
Phishing Campaigns Exploit RMM Tools to Target Businesses - Phishing campaigns are increasingly exploiting Remote Monitoring and Management (RMM) tools to infiltrate business networks. Cybercriminals leverage these legitimate IT management platforms to bypass traditional security measures, making their ...
4 months ago Infosecurity-magazine.com
20 Best Inventory Management Tools in 2025 - inFlow Inventory is a comprehensive inventory management tool designed for small to medium-sized businesses, offering features like real-time stock tracking, order management, and barcode scanning to streamline operations. The tool provides advanced ...
5 months ago Cybersecuritynews.com
Securing Remote Work: A Guide for Businesses - This article aims to provide businesses with a comprehensive guide to securing remote work, covering the essential components of remote work security policies and exploring best practices for ensuring secure communication. By implementing these ...
2 years ago Securityzap.com
Cybercriminals Utilizing Official Remote Surveillance for Viruses - A warning has been issued by the Cybersecurity and Infrastructure Security Agency, National Security Agency, and Multi-State Information Sharing and Analysis Center to alert network defenders about the malicious use of legitimate remote monitoring ...
2 years ago Cybersecuritynews.com
Telegram is a Wide-Open Marketplace for Phishing Tools - The encrypted messaging app Telegram has become a veritable marketplace for bad actors who want to launch effective phishing campaigns on the cheap, essentially democratizing the cyberthreat, according to researchers at cybersecurity firm Guardio. ...
1 year ago Securityboulevard.com
8 Tips on Leveraging AI Tools Without Compromising Security - Forecasts like the Nielsen Norman Group estimating that AI tools may improve an employee's productivity by 66% have companies everywhere wanting to leverage these tools immediately. How can companies employ these powerful AI/ML tools without ...
2 years ago Darkreading.com
Combat Phishing Attacks With AI-Powered Threat Protection - According to statistics, 81% of organizations have seen an increase in phishing emails since 2020, with an estimated 3.4 billion emails sent every day. AI-generated phishing emails are a sophisticated and evolving cybersecurity threat. ...
1 year ago Gbhackers.com
The Top 6 Cybersecurity Threats Businesses Must Tackle in 2024 - Through the rise of Artificial Intelligence, increased cyberwarfare and new emerging technologies, the security landscape has evolved significantly, with new threats emerging and existing ones growing in sophistication. Cybersecurity in 2024 is more ...
2 years ago Cybersecurity-insiders.com
The Future of Phishing Email Training for Employees in Cybersecurity - One common method they use is through phishing emails. To counter this changing threat, companies must give importance to providing phishing email training for employees on identifying and responding properly to phishing attempts. Standard training ...
1 year ago Hackread.com
How Businesses Prevent Credential Theft with Early Phishing Detection - By offering real-time, hands-on analysis, sandboxes give businesses the tools they need to stay one step ahead of evolving phishing attacks. Sandboxes like ANY.RUN offer real-time analysis, complete attack visibility, and tools that empower ...
6 months ago Cybersecuritynews.com
Phishing kits now vet victims in real-time before stealing credentials - Even if they were allowed to use the real target's address, the analysts comment that some campaigns go a step further, sending a validation code or link to the victim's inbox after they enter a valid email on the phishing page. However, with this ...
9 months ago Bleepingcomputer.com