Threat Actors Leverage Several RMM Tools to Expand Attack Surface

Threat actors are increasingly exploiting Remote Monitoring and Management (RMM) tools to broaden their attack surface and enhance their cyberattack capabilities. These tools, originally designed for IT administrators to manage and monitor endpoints remotely, have become attractive targets for malicious actors due to their extensive access privileges and control over networks. By compromising RMM platforms, attackers can stealthily deploy malware, move laterally within networks, and maintain persistence, making detection and mitigation challenging for security teams. Recent incidents highlight the use of multiple RMM tools by various threat groups to infiltrate corporate environments. Attackers leverage vulnerabilities in these tools or use stolen credentials to gain unauthorized access. Once inside, they exploit the legitimate functionalities of RMM software to execute malicious payloads, exfiltrate sensitive data, and disrupt operations. This trend underscores the critical need for organizations to implement stringent security measures around RMM tool usage, including multi-factor authentication, regular credential audits, and network segmentation. The cybersecurity community is urged to stay vigilant and share intelligence on emerging threats involving RMM tools. Enhanced monitoring of RMM activities, timely patching of vulnerabilities, and user awareness training are essential components of a robust defense strategy. As threat actors continue to innovate, understanding the risks associated with RMM tools and adopting proactive security practices will be vital in safeguarding organizational assets and maintaining operational resilience.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 15 Sep 2025 16:00:30 +0000


Cyber News related to Threat Actors Leverage Several RMM Tools to Expand Attack Surface

The Dangers of Remote Management & Monitoring Tools for Cybersecurity - Remote monitoring and management (RMM) tools are used by business organizations to manage and monitor their enterprise IT infrastructure from a central location. However, the increasing sophistication of hackers and cybercriminals has caused both ...
2 years ago Csoonline.com
20 Best Remote Monitoring Tools - 2025 - What is Good ?What Could Be Better ?Strong abilities to keep an eye on devices and systems.Some parts may take time to figure out.It gives you tools for remote control and troubleshooting.There could be more ways to change things.Lets you automate ...
9 months ago Cybersecuritynews.com
7 Best Attack Surface Management Software for 2024 - Attack surface management is a relatively new cybersecurity technology that combines elements of vulnerability management and asset discovery with the automation capabilities of breach and attack simulation and applies them to an organization's ...
2 years ago Esecurityplanet.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
2 years ago Trendmicro.com
Threat Actors Leverage Several RMM Tools to Expand Attack Surface - Threat actors are increasingly exploiting Remote Monitoring and Management (RMM) tools to broaden their attack surface and enhance their cyberattack capabilities. These tools, originally designed for IT administrators to manage and monitor endpoints ...
4 months ago Cybersecuritynews.com
Attack Surface Management: What is it? Why do you need it? - Traditional asset inventory and vulnerability management software can't keep up to date with the growing attack surface and morphing vulnerabilities. Contrary to other cybersecurity software, Attack Surface Management software operates from a ...
2 years ago Securityboulevard.com
CVE-2023-53649 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
Staying ahead of threat actors in the age of AI - At the same time, it is also important for us to understand how AI can be potentially misused in the hands of threat actors. In collaboration with OpenAI, today we are publishing research on emerging threats in the age of AI, focusing on identified ...
1 year ago Microsoft.com Kimsuky
Threat Actors Leverage RMM Tools to Expand Attack Surfaces - Remote Monitoring and Management (RMM) tools are increasingly exploited by cyber threat actors to infiltrate corporate networks and expand their attack surfaces. These tools, designed for IT administrators to remotely manage endpoints, provide ...
2 months ago Cybersecuritynews.com CVE-2023-27350 CVE-2023-27351 Lazarus Group FIN7
New Spam Campaign Abuses Remote Monitoring Tools to Attack Organizations - A sophisticated spam campaign targeting Brazilian organizations has emerged, exploiting legitimate Remote Monitoring and Management (RMM) tools to gain unauthorized access to corporate networks. The campaign primarily targets Brazil now, but security ...
8 months ago Cybersecuritynews.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
6 months ago Cybersecuritynews.com
Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations - WithSecure analysts identified this campaign through pattern analysis of PDF metadata and delivery mechanisms, noting the consistent use of embedded direct download links pointing to legitimate RMM vendor platforms. A sophisticated cyber campaign ...
5 months ago Cybersecuritynews.com
Limiting Remote Access Exposure in Hybrid Work Environments - Organizations have shifted to remote desktop work environments at an increasing speed since then - simultaneously expanding their attack surface and exposing themselves to greater cybersecurity threats. The remote work revolution has pushed companies ...
2 years ago Securityboulevard.com
Hackers Leveraging RMM Tools To Maintain Persistence To Infiltrate And Move Through Networks - Cybersecurity experts have identified a persistent trend of threat actors exploiting legitimate remote monitoring and management (RMM) software to infiltrate networks, maintain access, and facilitate lateral movement. These legitimate tools, which ...
10 months ago Cybersecuritynews.com
Detectify platform enhancements address growing attack surface complexity - Detectify announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These updates bring control over attack surface data and enable organizations to seamlessly configure alerts for policy ...
1 year ago Helpnetsecurity.com
8 Tips on Leveraging AI Tools Without Compromising Security - Forecasts like the Nielsen Norman Group estimating that AI tools may improve an employee's productivity by 66% have companies everywhere wanting to leverage these tools immediately. How can companies employ these powerful AI/ML tools without ...
2 years ago Darkreading.com
Cybercriminals Utilizing Official Remote Surveillance for Viruses - A warning has been issued by the Cybersecurity and Infrastructure Security Agency, National Security Agency, and Multi-State Information Sharing and Analysis Center to alert network defenders about the malicious use of legitimate remote monitoring ...
2 years ago Cybersecuritynews.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
2 years ago Trendmicro.com
What Is Cyber Threat Hunting? - Cyber threat hunting involves proactively searching for threats on an organization's network that are unknown to traditional cybersecurity solutions. A recent report from Armis found that cyber attack attempts increased by 104% in 2023, underscoring ...
1 year ago Techrepublic.com
IONIX ​​Completes $42M Financing Round to Expand Threat Exposure Management Across the Entire Attack Surface - PRESS RELEASE. TEL AVIV, Israel-(BUSINESS WIRE)- IONIX, a leader in Attack Surface Management, today announced it has completed its $42 million A Round financing by securing $15 million in additional funding from new investors Maor Investments along ...
1 year ago Darkreading.com
Top 7 Cyber Threat Hunting Tools for 2024 - Cyber threat hunting is a proactive security measure taken to detect and neutralize potential threats on a network before they cause significant damage. To seek out this type of threat, security professionals use cyber threat-hunting tools. With ...
1 year ago Techrepublic.com
Operation Morpheus took down 593 Cobalt Strike servers used by threat actors - Threat actors actively exploit D-Link DIR-859 router flaw CVE-2024-0769. Experts released PoC exploit code for a critical bug in Progress Telerik Report Servers. Threat actors may have exploited a zero-day in older iPhones, Apple warns. Nation-state ...
1 year ago Securityaffairs.com CVE-2024-0769 CVE-2022-38028 CVE-2023-49103 CVE-2023-46747 CVE-2023-46748 CVE-2023-4966 APT28
TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793 - As part of this analysis, we look at threat actor TTPs employed throughout the intrusion and how they were identified and pieced together by the FortiGuard IR team. The following section of this report focuses on the activities of one of these threat ...
2 years ago Feeds.fortinet.com CVE-2023-42793 APT29
Hackers use RMM tools to breach freighters and steal cargo shipments - Cybercriminals have increasingly exploited Remote Monitoring and Management (RMM) tools to infiltrate freighters and steal valuable cargo shipments. This emerging threat highlights the vulnerabilities in maritime logistics and the critical need for ...
2 months ago Bleepingcomputer.com
How to Overcome the Most Common Challenges with Threat Intelligence - Today's typical approach to threat intelligence isn't putting organizations in a place to do that. Instead, many threat intelligence tools are delivering too much uncurated and irrelevant information that arrives too late to act upon. Organizations ...
2 years ago Cyberdefensemagazine.com Hunters