Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
RMM Abuse: When IT Convenience Bites Back
Published:
March 5, 2026

RMM Abuse: When IT Convenience Bites Back

By:
Beth Robinson
Share icon
Glitch effectGlitch effectGlitch effect

Cybercrime is booming, and it’s cashing in on your trusted tools and software. That’s the reality of Remote Monitoring and Management (RMM) abuse. And why the Huntress 2026 Cyber Threat Report reported a mind-blowing 277% jump in RMM abuse in 2025. 


Key takeaways

  • RMM tools are essential for IT operations but increasingly weaponized by attackers, who exploit legitimate, pre-installed remote management software for interactive, hands-on-keyboard (HOK) access

  • RMM abuse is a leading cybercrime tactic because attackers gain persistent, stealthy access while evading security detection, since trusted RMM binaries don’t appear malicious

  • RMM compromises often start with phishing or social engineering, where users are tricked into installing a malicious RMM agent 

  • Approved RMM tools are abused by attackers, so organizations need to shift from trusting software presence to verifying behavior. This means defining a normal activity baseline, watching for anomalies, and keeping up with tool fingerprinting to quickly spot unauthorized or unusual remote access activity.

  • People are a critical defense layer. Security awareness training (SAT), mindful IT reviews, and a “see something, say something” culture help catch suspicious behavior before it turns  into ransomware or data exfiltration

Hear from our security pros on the current state of RMM abuse: 


The RMM abuse, now it's become a lot more rampant. I know every day I come in, I'm going to see an abused go to opener or a variant of something else. The challenge with RMMs is the fact that they are legitimately used. RMMs enable teams to remotely manage their fleets. By itself, it's a valid tool. It's just being used for nefarious purposes. They don't really stand out in the environment. It's just remote access. That's all it is. Instead of writing their own malware that conducted these command and control functions for them, instead they've actually moved over to using these legitimate RMM solutions. These tools that used to provide security are now introducing new attack vectors. Why rebuild, from scratch when you have tools that you can just pull off the shelf? If this organization already has an RMM solution in place, they're often going to overlook it as a compromise. If they can get into the valid RMM tool, then hey, they can hide in the noise. As a matter of fact, we've had many cases where we found rogue RMM tools and the customer would disagree and say that this is something that they put over there. It is legitimate. We use it on a daily basis. This is our RMM tool. Humans don't necessarily fail because they're careless. They fail because our systems are not designed to nullify the ability for them to be careless. The end users are often socially engineered into downloading a file. Oh, you have an invite for a party and it's an invite. Exe and they execute it. And guess what? It's not an invite and they immediately give the attacker access. It's a very easy initial access point for the threat actors. I think it's just gonna take a lot more productivity from the RMM software creators to actually make it harder for attackers to just pull this off the shelf and use it. It oftentimes is just a failure of the basics, a failure of the common controls being applied correctly. You lock down remote desktop, you monitor what remote access software is in your organization, much better chance at not becoming that low hanging fruit that they're looking for. Download the Huntress twenty twenty six cyber threat report to stay ahead of the cybercriminals targeting your business.


The RMM reality check

RMM tools are the lifeblood of modern IT administration. They’re how security pros patch systems, troubleshoot issues, and manage networks from anywhere in the world. But this powerful utility has a dark side. When a security team’s own shield becomes the entry point for an attacker, the game changes entirely. It’s not just about cybercriminals dropping external malware anymore. It’s the mayhem they bring to the trusted tools already sitting on your endpoints. And cybercriminals don’t play by anyone’s rules but their own. 


The perfect disguise for adversaries

RMM abuse has become one of the most widespread threats in the cybercrime ecosystem, and for good reason. It’s an ideal path of least resistance for attackers to gain access and persist in business environments. Attackers have realized that using pre-installed, legitimate software to launch attacks is more effective than trying to push custom malware past a firewall or endpoint detection and response (EDR). RMMs are interactive, HOK access, so attackers hide in the noise of daily operations.

RMM tools are designed to provide continuous remote access. But when an attacker compromises these tools, they inherit that persistence. Suddenly, they can automate tasks, move laterally across the network, execute commands, and even drop ransomware, all while appearing to be a helpful IT administrator. The Huntress 2026 Cyber Threat Report findings show that over 50% of cases following suspicious Atera RMM activity are directly linked to ransomware attacks. 

Here’s why this creates a massive headache for defenders. Security products are tuned to spot known bad signatures, like ransomware or remote access trojans (RATs). But a valid RMM binary isn’t a red flag, so it often slips past security detections in the name of business continuity. 


How RMM compromises play out

It often begins with sneaky social engineering and phishing scams. Users receive an email that looks authentic: think DocuSign request, a party invitation, or a Dropbox link. It then prompts them to click a link or download a file to view a document. But they aren't actually opening an invite or an invoice. They’re installing an RMM agent that connects directly to the attacker. The attacker has immediate access to your environment as soon as the agent installs.

Figure 1: A lure for a rogue RMM installation

In other cases, like this one from our Security Operations Center (SOC), a threat actor used stolen RMM credentials to gain initial access to a partner’s environment. Luckily, our SOC contained the threat about 12 minutes after the threat actor executed the first command, and then stepped up to help the partner further manage the incident. 

But the bottom line in this case is that the partner’s approved RMM software was abused, leading to a fast-moving intrusion that involved running enumeration commands and attempting defense evasion by disabling the Huntress agent. Since the credentials belonged to an IT support technician, the threat actor would have gained access to all environments managed by the managed service provider (MSP) if the threat hadn’t been contained within minutes.

Figure 2: A threat actor attempting to uninstall a Huntress agent


Figure 3: RMM is spotted as an initial intrusion vector

In supply chain attacks like the example above, the stakes are even higher. When attackers compromise an RMM solution used by an MSP, they gain direct, interactive access to every single customer managed by that MSP. 

In 2025, these common email messages doubled as the most common phishing bait, so pause before you click:

  • E-signature request (14.2%)

  • Invoice notification (7.8%)

  • Voicemail notification (7.5%)

  • File share (6.8%)


Figure 4: Most common phishing lure themes in 2025


Legit tools. Bad intentions. 

Too often, businesses make this common security mistake: if a tool is approved, every instance of it is automatically trusted. 

But let’s consider a scenario where a remote employee uses an RMM to access their laptop from home. An administrator sees the traffic and assumes, "Normal activity."

But this assumption can be risky. Just because the RMM traffic is expected doesn’t mean this specific session isn’t an adversary hiding in plain sight. Attackers bank on that complacency. They know IT teams are conditioned to expect these tools in the environment. 

Defending against this requires a shift in mindset. The presence of approved software isn’t proof of security. When strange timing, users, or behavior shows up, the activity warrants a second look, even if the tool itself is authorized. 


Define the baseline

How do you defend your environment when the threat looks strikingly similar to your admin tools? The first step is to define what "normal" looks like for your organization: 

  • What’s the standard level of user activity? 

  • Which users typically access which tools? 

  • What time of day do these connections usually happen?

If you know your baseline, anomalies stand out fast. When a user in marketing suddenly runs command-line scripts via an RMM tool at 3am, you’ve got a problem. It doesn’t matter if the tool is approved because the behavior isn’t. 

Dedicating resources to review these RMM usage patterns helps you catch sketchy deviations before they snowball into full-blown ransomware or data exfiltration. When tools like RustDesk or Atera are abused, ransomware damage can unfold in as little as an hour or two, according to the Huntress 2026 Cyber Threat Report. 


Inventory everything: The power of fingerprinting

It’s not enough to know that you “use ScreenConnect.” You need an ongoing, detailed inventory of your attack surface. Dig into the details and create fingerprints of your digital ecosystem that answer questions like this:

  • What specific RMM tools are approved for our environment?

  • What are the approved executable hashes for these tools?

  • What URLs or IP addresses should these tools connect to?

By fingerprinting approved tools, you can set up alerts for anything that doesn't match. If a new RMM shows up and the hash doesn't match your allow list, or if it tries to connect to an unknown server, you know it needs to be checked out ASAP.

Treat every remote access tool like a potential intruder until verified. If you find a tool you didn't install, that’s not business as usual. Verify the configuration, check the logs, and confirm the connection endpoint for valid or malicious activity.


The human element: Your strongest line of defense

Your strongest line of defense? Your people. That matters more than ever with RMM abuse, where attackers exploit human trust for access and hide their attack path behind trusted software. Attackers count on human errors to unlock the front door, often through phishing or social engineering. 

Spotting shady behavior early is what keeps a small red flag from turning into a full-blown breach. Managed Security Awareness Training (SAT) helps end users notice sly social engineering attempts that deliver malicious RMM payloads. Everyone deserves to know that a "party invite" doesn’t require administrative privileges to open.

Furthermore, encourage a culture of vigilance within your IT and security teams. If an analyst sees something weird, they should feel comfortable speaking up. "See something, say something" applies to network traffic just as much as it does to physical security. If your whole company is equipped to watch for outlier behavior, you close the gap between infection and detection.


Stopping RMM abuse requires teamwork

RMM abuse isn’t disappearing anytime soon. As long as these tools provide easy, powerful access and cash flow, attackers will use them.

Shutting down this trend will require collaboration between RMM vendors, cybersecurity companies, and (potentially) government agencies. We need to make it harder for attackers to abuse these tools anonymously. This could look like stronger vendor-side abuse detection, faster removal of malicious instances, and better intelligence sharing to identify rogue servers more quickly.

Until then, security teams have to step up their game. Your RMM is a powerful tool, but in the wrong hands, it’s your toughest competition. 

Download the Huntress 2026 Cyber Threat Report or the TL;DR to better understand and stay ahead of RMM abuse in your own environment.


Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Step inside the dark world of cybercrime

Join us on March 18 (12pm EST) for _declassified, a raw intel drop where John Hammond and Jim Browning break down how modern cybercrime runs like a real business.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Daisy-Chaining Rogue RMM Tools: How Threat Actors Abuse Remote Management Software for Initial Access

    The abuse of remote monitoring and management (RMM) tools is surging. See how threat actors daisy chain RMM software for initial access, persistence, and detection evasion.
  • Top 3 Cybersecurity Threats of 2024 (So Far): What You Need to Know

    Get to know 2024’s three biggest cyber threats—RMM abuse, BYOVD attacks, and WebDAV abuse—and learn how to defend your business from these rising risks.
  • Hiding in Plain Sight with App Domain Manager Injection

    Uncover how attackers use App Domain Manager injection to run code inside trusted .NET apps by tweaking config files and bypassing application controls. Learn key strategies to detect and stop these attacks.
  • RATs! Remote Management Software from the Hacker’s Perspective

    Tips and tricks to hunt down RMM abuse. Remote access tools for persistence. Are RMMs really just command and control? January’s Tradecraft Tuesday was wild. Here’s the recap.
  • Take Control: Locking Down Common Endpoint Vulnerabilities

    Learn how to lock down common endpoint vulnerabilities like weak passwords and unpatched software to secure your systems against threats like phishing and malware.
  • Why App Allowlisting and Zero Trust Solutions Alone Won’t Save You

    App Allowlisting is a good preventative software tool, but it's not enough. Learn why a layered security approach with detection and response is crucial to protect against today's cyber threats.
  • The Top Four CVEs Attackers Exploit

    Learn about the top four Common Vulnerabilities and Exposures (CVEs) attackers are exploiting—and how you can defend against them.
  • How Hackers Exploit Windows Administrative Shares

    Windows' administrative shares feature is often overlooked by users, but not by hackers. Learn how attackers abuse administrative shares to propagate.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy