Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Daisy-Chaining Rogue RMM Tools: How Threat Actors Abuse Remote Management Software for Initial Access
Published:
March 11, 2026

Daisy-Chaining Rogue RMM Tools: How Threat Actors Abuse Remote Management Software for Initial Access

By:
Chad Hudson
Share icon
Glitch effectGlitch effectGlitch effect

The abuse of remote monitoring and management (RMM) tools is a trend that has been quietly building for some time. As an industry, we recognise it well and tend to speak about it in hushed tones. But it isn’t flashy, it doesn't generate headlines, and it doesn’t carry the intrigue of DPRK intrusions or the sophistication of malware downloaders like ClickFix. Instead, it’s the familiar unease that sets in when we see certain legitimate tools being quietly, repeatedly abused. 

We’re seeing this abuse span every tier of threat actors, from individuals with little to no skill to more established groups. Given this, it should come as no surprise that RMM abuse was the most common threat we observed last year, accounting for nearly a quarter (24%) of all observed incidents. But the increasing rate at which these tools are being abused should raise alarms. According to our latest research, RMM abuse surged 277% last year, as threat actors abandoned traditional hacking tools and built entire playbooks around these tools to drop malware, steal credentials, and execute commands.

This blog analyses several cases we investigated during December 2025 and January 2026 to demonstrate a common tactic we see with RMM abuse: daisy-chaining distinct RMM tools to fragment telemetry, distribute persistence, and complicate attribution and containment efforts.

During this period, we also observed threat actors signing up directly to the Huntress platform itself. This provided us with rare, firsthand visibility into their RMM patterns, operational workflows, and post-installation behaviour, offering a unique lens into how these campaigns are orchestrated from the operator’s perspective.


Tradecraft observed during intrusions

In December 2025, we observed lower-skilled threat actors leveraging rogue RMM MSI installers to establish initial access and execute follow-on payloads. In multiple cases, these installers spawned large language model (LLM)-generated infostealer scripts designed to identify potentially valuable user accounts. The scripts primarily parsed browser history for references to financial and cryptocurrency platforms, including QuickBooks and Coinbase, indicating an objective of rapidly identifying monetisable access.

Despite this intent, the script reflected limited technical maturity. In one example, code comments indicated that harvested data would be transmitted to a threat-actor-controlled Telegram channel; however, the script didn't actually implement the Telegram API functionality required to perform this exfiltration. As a result, while local data collection occurred as intended, the exfiltration stage was never successfully executed.


Figure 1: Code comment from LLM created a script designed to send results to Telegram

In January 2026, we observed threat actors leveraging vulnerability management software such as Action1 to deploy ScreenConnect clients via Microsoft Installer packages. There’s nothing particularly sophisticated about this approach; it relies on abusing legitimately signed deployment tooling to daisy-chain ScreenConnect installations for persistent remote access.


Figure 2: ScreenConnect deployment via Action1 vulnerability management software


Threat actors have also attempted to sidestep detection by reusing familiar daisy-chain techniques from vulnerability management and deployment tooling, this time relying on wscript to install additional payloads. The scripts themselves, once again, appear to have been assembled using LLMs, based on the coding style, comment structure, and overall syntax.


Figure 3: ScreenConnect deployment via WScript


During a similar campaign, we observed Telegram messages for “InjectProx-hiro Remote Support”. The tooling itself is relatively simple: it deploys a ScreenConnect client and sends a bot notification containing the victim system’s computer name.


Figure 4: Telegram API notification via WScript


The list keeps growing. We’ve observed abuse extending beyond widely used RMM platforms to lesser-known RMMs like HeartbeatRM, often delivered through familiar invitation-themed lures. At this point, any deployment or management software offering trial access or “free” deployment allowances is being actively abused or is likely to be abused in the near future.


Figure 5: HeartbeatRM execution from invitation lure


In most cases, the threat actors abusing this technique are low-level, seeking any foothold they can gain for initial access. We consistently see this spike around predictable themes such as the United States tax season, or lures impersonating the Social Security Administration, because they’re easy to mass-produce and reliably generate clicks.

These lures are pushed via broad email campaigns or surfaced through search-engine poisoning, funnelling victims toward invitation or document-themed downloads that ultimately lead to RMM deployment rather than traditional malware.


Figure 6: Fake Social Security Administration websites

While investigating these watering-hole campaigns, we identified multiple GitHub repositories being abused to host phishing infrastructure, including repositories associated with VH851 and Drasticc user accounts. Huntress proactively reported these accounts, amongst others, to reduce the number of victims impacted by this activity; however, the activity tied to these repositories dates back to November and December 2025, indicating sustained use rather than a short-lived campaign.


Figure 7: VH851 GitHub repository


While gathering artifacts from VH851, we identified multiple repositories linked to invitation-based lures, including invitatapartyTo.msi.

One particular repository, rty, was of interest and demonstrates a more deliberate approach to infrastructure setup. Rather than hosting content on a disposable file-sharing platform, the threat actor likely configured a custom domain via GitHub that references the CNAME record, allowing full control over how the phishing site is presented and delivered within GitHub.

The repository includes a minimal but functional phishing site (index.html) paired with supporting assets (background.jpg), designed to present a convincing invitation or RSVP-style lure.  


Figure 8: Contents of the rty repository


The index.html file itself is deliberately minimal, but it’s doing more than just presenting a lure. The page attempts to force delivery of an MSI installer using multiple browser-native techniques, increasing the likelihood that at least one succeeds depending on browser configuration or security controls.

Specifically, the page cycles through three distinct download mechanisms:

  • Attempt 1: Programmatic anchor click, a hidden <a> element is dynamically created and clicked to trigger a direct download of the MSI from GitHub’s raw content endpoint.

  • Attempt 2: Hidden iframe injection where if the anchor-based download fails, the page attempts to load the MSI via a hidden <iframe>, a common fallback that can still succeed in environments with relaxed download restrictions.

  • Attempt 3: Fetch-to-blob download as a final attempt; the page fetches the MSI, converts it to a blob, and forces a local save. This technique is more verbose but can bypass simple blockers that rely on URL-based download heuristics.

This approach is brute-force reliable. The threat actor isn’t exploiting a browser vulnerability; they’re stacking legitimate web APIs until one of them works. It’s a pattern we’ve seen repeatedly in low-effort RMM delivery campaigns, where reliability matters more than stealth.


Figure 9: index.html and brute force download functions


By searching for key strings and functional components from the index.html across other repositories, we identified Drasticc, another abused GitHub repository that predates VH851 and shows a longer period of activity. Compared to VH851, Drasticc appears to have been more actively maintained.


Figure 10: Drasticc GitHub repository


Reviewing these repositories and their contents provides useful insight into the threat actor's activity, including which operating systems they targeted, how those platforms were delivered, and the types of phishing lures they consistently relied on. Taken together, these artifacts help build a clearer picture of the threat actor's intended targets.

In related repositories focused on Social Security Administration lures, we also observed a simple yet deliberate control. When the user agent was set to anything other than Windows, the page returned an “Access Denied” message. 


Figure 11: Access Denied, only Windows is allowed


This lightweight filtering is reflected in the client-side logic. The page fingerprints the visitor’s operating system using standard browser properties (navigator.userAgent, navigator.platform, and userAgentData) and makes a simple decision; Windows is allowed, and everything else is blocked.

If the visitor is identified as running Windows, the page transitions to the “success” state and continues toward delivery. If not, the user is presented with an “Access Denied” message instructing them to use a Windows device instead. 


Figure 12: GetOS functionality to ensure only Windows devices


We also observed a separate campaign that took the opposite approach, deliberately targeting only mobile users. In this case, the page would not load unless the user agent matched a mobile device. Desktop browsers were either blocked or served no meaningful content.

When accessed from a mobile device, the page presented what appeared to be a legitimate online greeting card. From there, the victim was prompted to sign in to their email provider to “view” or “manage” the invitation. The main goal here was credential harvesting rather than malware or RMM delivery, leveraging mobile users' familiarity with in-browser sign-in flows and reduced visibility into URL and certificate details.


Figure 13: Mobile device only


Another campaign leverages services like Cloudflare, which is designed to protect legitimate infrastructure. In this case, the same controls are being leveraged to shield malicious delivery infrastructure. The site sits behind Cloudflare, obscuring the origin web host and limiting visibility into backend hosting details, request telemetry, and geographic location.

From the threat actor’s perspective, this adds a layer of friction for defenders rather than victims. IP-based blocking, hosting attribution, and takedown efforts become slower and less precise, while the user-facing experience remains clean and trustworthy. The presence of Cloudflare branding and “secure transfer” messaging further reinforces legitimacy at the moment the download is initiated.


Figure 14: Cloudflare service abuse allowing user to download documents-9c765e28.msi



Threat actors probing Huntress detection capabilities

In December, Lindon Wass, a member of our Detection & Engineering Threat Hunting (DE&TH) team, observed threat actors signing up to the Huntress platform, likely to test detection capabilities and understand response behaviour. This activity provided a rare opportunity to gain visibility into their operational practices, rather than inferring intent solely from external telemetry.

Through this observation, we were able to identify elements of the toolkits they were using, along with a consistent motive: gathering as much information as possible to later monetise. 

The threat actor purchased a Virtual Private Server (VPS) hosted by Crowncloud, on which they installed Huntress. During their operational setup, the actor purchased gift cards from business[.]gogift[.]com and downloaded the CertifyTheWeb tool to automate SSL/TLS certificate management. The use of gift cards likely served to obfuscate their identity when registering domains.

We observed the threat actor using DeepSeek as part of their setup workflow, likely to assist with domain generation and other preparatory tasks. Once that phase was complete, they began downloading various browser extensions. The threat actor was observed searching for and installing an Email Extractor. 


Figure 15: Email Extractor from Chrome Web Store


The email extractor extension collects email addresses, phone numbers, and social media identifiers. These harvested contacts are then likely used as potential lead lists, sold to other threat actors, and even reused by the threat actors themselves to distribute future phishing lures.


Figure 16: Email Extractor


Alongside the email extractor, the threat actor also downloaded and used Proxy SwitchyOmega 3 (ZeroOmega) in combination with 9Proxy. Together, these tools provide consistent IP routing, basic evasion, and a degree of operational safety when accessing victims' email accounts, helping reduce account lockouts and correlation across sessions.


Figure 17: Proxy SwitchyOmega 3 (ZeroOmega)


After installing these extensions, we observed the threat actor logging into victims' email accounts and attempting to access associated banking portals, likely abusing password reset workflows to take over linked services. In parallel, they used email extraction tools to harvest additional contact data, including email addresses, social media profiles, and other identifiers, thereby expanding the pool of potential victims.

During this phase of activity, the threat actor also downloaded Hotmail combo lists (HOTMAIL VALID ACCESS and Fresh Valid Hotmails).


Figure 18: Hotmail valid access combo list


Once they have the lists, they use Lite 1.7 Email Extractor to parse the data.


Figure 19: Lite 1.7 Email Extractor


Skimming over a lot of the initial tooling, we get to the threat actor installing ScreenConnect with the version 25.2.4.9229 and setting up Screenconnect Web Server and Session Manager. Once this was set up, we saw them create installers such asdigitalgiftcard_*.msi, punchbowl_invitation.msi, and invitation_cp.ClientSetup.msi.

Funnily enough, we also saw them doing additional research on alternative RMMs that work perfectly. This shows they’re always on the lookout for other RMMs to trial and abuse.


Figure 20: Recreated Google Research for other RMMs that alternatively work similarly to ScreenConnect


We also identified a file named toolbox.rar, contained within the administrator's documents directory, which contains a commonly abused artifact our SOC has previously observed and documented. 


Figure 21: toolbox.rar contents


One notable capability missing from earlier versions of this toolkit but observed more recently is the use of Sordum’s “Hide from Uninstall List” utility to conceal RMM installations from Add/Remove Programs. This tactic increases dwell time by making the presence of remote access tooling less obvious.

Historically, this utility has been deployed under the filename HideUL.exe, but we’ve since observed threat actors renaming the binary in an attempt to evade detection.


Figure 22: Hide From Uninstall List by Sordum Team


One of the more common post-access tricks we keep seeing is a binary named pin.exe, usually dropped after an RMM session is already established. It’s a small .NET executable that straight-up pretends to be Windows Security.

When launched, it throws a familiar “Making sure it’s you” prompt and asks the user to enter their Windows login PIN, claiming a threat was detected. If the user tries to cancel out, the prompt just comes back.

If the user gives in and enters their PIN, the value is written to a plaintext file called output.txt, typically saved in whatever directory the binary was launched from. In most cases we’ve seen, that’s ScreenConnect\Temp.

Figure 23: Pin.exe masquerading as Windows Security to harvest PIN credentials

We were also able to view the threat actor’s Telegram Desktop. As mentioned earlier, this threat actor isn’t doing anything clever; they're focused on gathering as much information as possible and holding onto access long enough likely to sell it off later.

The Telegram directory contained highly sensitive data, including W-9 forms, Social Security numbers, and other personal information belonging to likely victims. There’s no real technical skill on display here. These threat actors aren’t writing any malware; they're just weaponising legitimate remote tools as their C2 and vacuuming up anything of value they can find.

We extracted logon activity from the server, which shows access coming from multiple providers and high-risk regions:

  • 209.160.115[.]150 - Paradise Networks LLC

  • 98.97.79[.]68 - SpaceX Nigeria

  • 105.113.63[.]173 - Celtel Nigeria Limited t.a ZAIN (Airtel Nigeria)

  • 93.152.214[.]210 - Euro Crypt EOOD



For additional context on RMM daisy-chain abuse, our SOC previously published "A Series of Unfortunate RMM Events," which explores this behaviour in greater depth. Rather than repeat any further analysis here, it’s worth underscoring the core takeaway: this tradecraft isn’t clever, it’s consistent.

Social Security-themed lures remain one of the most reliable delivery mechanisms. Across these campaigns, Huntress has observed RMM binaries signed by SimpleHelp, GoTo Technologies, and Datto (Centrastage), all used to deploy the ScreenConnect Client. While the filenames vary, the underlying patterns are repetitive and immediately recognisable:

  • Social_Security_eStatement_*_Pdf.exe

  • Latest_Social_Security_eStatement_*.exe
    SOCIAL-SECURITY_DOCUMENT*.exe

  • SSA_eStatement*.exe

  • My_Social_Security_eStatement_*.exe

  • SocialSecurityAdministration-Statement.msi

  • SSA statement.scr

Alongside these, invitation and RSVP-themed campaigns continue to grow. These lures are typically framed as meeting requests or social events, celebrations, parties, or “exclusive” invitations and are designed to look routine enough to avoid scrutiny.


Figure 24: Invitation-themed phishing page leading to a rogue RMM deployment


Once again, the same daisy-chain techniques appear. Filenames masquerade as harmless invitations while silently installing RMM software:

  • invite*.exe / invite*.msi

  • invitation*.exe / invitation*.msi

  • RSVP*.exe / RSVP*.msi / RSVP*.scr

  • OPENINVITATION*.msi

  • PartyInvite*.msi

  • VVIP_*Invitation*.msi

  • EveningGathering_PreviewRSVP*.msi

  • Events_*Invitation*.msi

As an industry, RMM vendors need to take a more active role in addressing abuse within their platforms and make it easier for security teams and victims to report misuse. The repeated use of legitimately signed RMM binaries to deploy follow-on tooling highlights how RMM-based intrusions are becoming both more common and more resource-intensive to investigate.

But this isn’t a problem vendors can solve on their own.

To meaningfully curb RMM daisy-chain abuse, the industry needs to change how remote management tooling is treated. RMM installations, particularly those originating from user-writable paths, email-delivered installers, or trial-based deployments, should be treated as security-relevant events rather than routine IT noise. If an RMM deployment can’t be clearly tied back to an authorised workflow, it should be scrutinised by default.

Greater consistency in telemetry would also raise the bar. RMM platforms vary widely in what they expose: installer prevalence, deployment history, audit logs, and parent-child process relationships are often incomplete or absent. Establishing baseline expectations for logging and transparency would make abuse easier to detect and harder for attackers to hide behind “legitimate use.”

Trial and free-tier models are another pressure point. While they reduce friction for legitimate adoption, they also provide threat actors with a low-cost, low-risk entry point. Stronger identity verification, tighter deployment limits, and better monitoring of anomalous trial usage would significantly reduce their appeal.

On the defender side, outright blocking RMM software is rarely practical. Instead, organisations should normalise explicit allow-listing of approved tools and treat unrecognised RMM activity as suspicious until proven otherwise. Community-driven resources like lolrmm.io help support this approach by providing shared visibility into commonly abused platforms.

Most importantly, we need to keep sharing patterns, not just indicators. Filenames change. Hashes rotate. Infrastructure shifts. But lure themes, delivery paths, and daisy-chain behaviours persist. Sharing those patterns does far more to disrupt attacker workflows than static IOC lists ever will.

RMM abuse isn’t really a tooling problem; it’s a trust problem. Until the industry collectively adjusts how much implicit trust these tools are granted by default, threat actors will continue to operate comfortably in the space between “legitimate” and “malicious.”

Here is a list of the most commonly abused applications observed deploying the ScreenConnect Client software:

  • AnyDesk

  • Action1

  • Atera

  • CentraStage (Datto)

  • Chrome Remote Desktop

  • FleetDeck

  • GoTo Resolve

  • GoToTerm

  • Gorelo RMM

  • Heartbeat RM

  • ImmyBot

  • Itarian RMM

  • LiteManager

  • MeshAgent

  • Miradore

  • NetSupport

  • PDQ Connect

  • PDQ Deploy

  • Quick Assist

  • RustDesk

  • ScreenConnect

  • SimpleHelp

  • Splashtop

  • Synchro

  • Tactical RMM

  • UltraVNC

  • WinVNC


Filename

Hash

toolbox.rar

79f25a73e056ecb8aebf36c593ad1826cefa31346a2feca1ba3ed395453c9c48

disable_cmd.exe

83a8c175cdab60d043759ea04d62ac10a147d0b00e7a610f35e4939873416adc

disable_control_panel.exe

42ef97c8260f9f287ead7b978378de2f27056f23dc513de5f36819159bfe5ebe

disable_task_manager.exe

429cbc557b1a9c8ceddab06b12b0fc3fc03c2908bb9ccd5ec8d2b386ccdb679a

DisableTaskManager.exe

db341aaa9cd902b1917b70986832b96325cba577930269bcf759a20404f1d90b

DisablePowerOptions.exe

ca9ac952feaaa5cbbbdea15716ee2acd3b1072f01156b5d2fb35066703de6955

EnablePowerOptions.exe

22006710eaad12c4da19edaee4cb6fdd3c3face7e16bbcbd9e4f83eed7f3e7de

EnableTaskManager.exe

ec2bdcd616d9dcfbb9bff53d9649c4456823b7384aef65ad1838b5a9fc69e879

hide_from_cp.exe

1a0769b8445cc27e2ddcdcee9a85a072c2be729e254f6c732548b0fb2bdfe0ef

hide_mouse.exe

27c489d5239a3a25f51119b45b7be1ae8a38a153d708f983837d3c602bd367f8

HideMouse.exe

bc8b1b0c80512ba0e8ffccfee5b507df16a3355db1143c3ba81ef42dac1baa6c

HideFromControlPanel.exe

6cc665057c4a4fe42a309afd3a7fa96cf1af126e9c6e08e56df5105e05378bcc

no_power_off.exe

ebc81a8f91d9b18c7d642bfdcf5f8e26d8921d4501e44e1603c0b67666d8c3e1

Password.exe

f2c0c09f4871621ce6dc0cc98dbeba596f08453dd6bdc1f001f26449b1eddfb3

phone_link.exe

b775f42c9d280b115ac0aeb168186583f93d94a19a29b7fac8c5e2c98c986bdd

phonepc.exe

499d07894f730fb685ee3cbfc1a933e0da93750c1ed25a49b2eb9c32adef156a

PIN (1).exe

a93c946c237b981189d2668d938a9d4d1d9681757e48dae8d9d65ed25b5da657

PIN.exe

a93c946c237b981189d2668d938a9d4d1d9681757e48dae8d9d65ed25b5da657

WebBrowserPassView.exe

ae5afb20bc1455322c089eed22c81facb19195ed816bb52b0f405a62fd92dda7

Windows Defender DAC.exe

bfa9c3298a749c8949f890ef02b4d07589bea1635150d57215b2f37b6f3acef0





Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Step inside the dark world of cybercrime

Join us on March 18 (12pm EST) for _declassified, a raw intel drop where John Hammond and Jim Browning break down how modern cybercrime runs like a real business.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • A Series of Unfortunate (RMM) Events

    Recently, the Huntress SOC has observed threat actors increasingly use PDQ and GoTo Resolve to deploy further remote monitoring and management (RMM) tools in attacks.
  • Rogue RMMs: Common Social Engineering Tactics We Saw in 2025

    From lures involving Social Security statements to top domains and hashes used in attacks, here's an in-depth look at incidents involving ScreenConnect in 2025.
  • RMM Abuse: When IT Convenience Bites Back

    Cybercrime and RMM abuse is up 277% as attackers exploit trusted tools for stealthy access. Learn how to shift from overtrust to verifying behavior and secure your network.
  • Employee Monitoring and SimpleHelp Software Abused in Ransomware Operations

    Huntress uncovers ransomware operations abusing employee monitoring software and SimpleHelp RMM for persistence, and ransomware deployment.
  • RATs! Remote Management Software from the Hacker’s Perspective

    Tips and tricks to hunt down RMM abuse. Remote access tools for persistence. Are RMMs really just command and control? January’s Tradecraft Tuesday was wild. Here’s the recap.
  • Insights: RMM Tools

    Over the past year, the Huntress team has posted a number of blog posts related to remote monitoring and management (RMM) tools being installed or abused by threat actors.
  • How a Proactive Account Review Uncovered Unauthorized Surveillance Tools

    A routine account review revealed the use of productivity monitoring tools in a medical clinic, highlighting the hidden risks associated with employee monitoring software. Learn the importance of proactive audits in protecting critical systems and sensitive data from potential threats.
  • Attackers Abuse Trust with Indirection

    Preventive security products like antivirus have made major strides in their ability to detect malicious behaviors as opposed to weak/static signatures. When implemented properly, these heuristics are capable of discovering even the most cleverly obfuscated routines. But don’t ring the victory bells yet. This cat-and-mouse game is just getting started…

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy