Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Tales of Too Many RMMs
Published:
April 17, 2025

Tales of Too Many RMMs

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect

In a highly interconnected world, remote monitoring and management (RMM) tools are critical to reducing cost and increasing efficiencies. However, these tools pose challenges and even significant risk if not properly managed. Huntress analysts have observed the use of legacy RMM tools in attempts to install ransomware, and have provided insights regarding the overall use of RMM tools by threat actors as a means of maintaining persistence.  

As illustrated in Figure 1, the Huntress 2025 Cyber Threat Report provides insight into what Huntress has observed as the top abused remote access tools.



Figure 1: Top abused remote access tools, per Huntress

Looking beyond the Huntress aperture, Figure 2 illustrates, from the 2025 Arctic Wolf Threat Report, that 93.0% of ransomware and data extortion cases were the result of external exposure, with 59.4% of cases being the result of external remote access/RMM tools.


Figure 2: Root causes of ransomware & data extortion IR cases (source: Arctic Wolf)

Critically, this illustrates the challenges associated with interconnectivity across any enterprise environment. However, this is more particularly the case within the managed services provider (MSP) and managed detection and response (MDR) space. For example, Huntress has responded to incidents where the means of initial access was achieved through compromise of a legacy RMM that was in place prior to a business moving to a new MSP. 

However, threat actors compromising legacy RMM tools or installing their own RMM once they’ve gained access to an endpoint still doesn’t illustrate the entire picture. Huntress has observed incidents where multiple RMM tools were in legitimate use, sometimes by multiple vendors or service providers. In these incidents, the time it takes to determine the scope of the incident is extended, as such tools often require identification, then retrieval of and detailed examination of individual log files to determine “normal” usage.


Threat actors using RMM tools

Huntress analysts have observed incidents where threat actors have used various means to install RMM tools such as SimpleHelp or Mesh Agent. In some instances, threat actors have accessed endpoints via SMB/RPC or the MSSQL instance to enable RDP or to install other RMM tools. 

Incident 1

During an incident identified on 7 Feb 2025, evidence indicated that UltraVNC had been installed on 14 May 2023, and that since that time, it had been subject to brute force password guessing attacks. In fact, the available logs illustrated 2,189 failed login attempts from various public IP addresses. Following the failed login attempts, Figure 3 illustrates a series of successful UltraVNC login/logoff events leading up to and including the date and time of the incident.


Figure 3: UltraVNC logon/logoff events 

Note that the final logon session illustrated in Figure 3 lasted less than a minute; however, the investigative timeline illustrated that during that timeframe, the threat actor installed AteraAgent via the following command line:

"C:\Windows\System32\msiexec.exe" /i "C:\Users\<user>\Music\setup.msi"

This event in the timeline was followed by MsiInstaller events illustrating the successful installation of AteraAgent. Shortly after the installation was completed, the file C:\Windows\TEMP\unpack\setup.msi was launched, successfully installing SplashTop Streamer. The SplashTop Streamer installation pointed to a public IP address that was also the source of 168 failed login attempts (per the available logs). 

The investigative timeline then showed that at 2025-02-07 05:02:35Z, a successful login occurred to SplashTop Streamer, multiple files were transferred to the compromised endpoint via that connection, and several credential theft tools were run, including mimikatz and the XenArmor browser password recovery tool.

One of the files downloaded to the endpoint was named EreignisseLoeschen.bat, which, in German, refers to “delete events.” This file could not be recovered from the endpoint, but Windows Event Logs were successfully retrieved from the endpoint. As such, it’s unclear exactly what the contents of the file were, but it may not have been executed, as the threat actor’s activities were thwarted before they got to that point in their attack. 

In this incident, the threat actor gained access to an endpoint via a legacy RMM, and installed another RMM tool while retaining access to the original initial access vector. 

Huntress has also observed incidents where threat actors have installed multiple RMM tools. Yes, you read that right…multiple RMM tools. 

Incident 2

During the final week of March 2025, Huntress Security Operations Center (SOC) analysts reported an endpoint on which Akira ransomware had been deployed. An investigation into the incident indicated that three days prior to the incident, a threat actor had accessed the endpoint via RDP that was not protected via MFA, and ran netscan to enumerate endpoints on the network. The investigation revealed that this access originated from a workstation that Huntress had previously observed associated with Akira ransomware incidents.

On the day that the ransomware was deployed, the threat actor accessed the reported endpoint from another legitimate endpoint on the customer’s network, one that did not have a Huntress agent installed, and was therefore not being managed via the Huntress SOC. The threat actor moved laterally between the endpoints via RDP, and within minutes of accessing the reported endpoint, installed the Chrome Remote Desktop Host, RustDesk, and AnyDesk, all in rapid succession. 

Shortly after this installation activity completed, the threat actor launched the file C:\Users\<user>\AppData\Local\Temp\AVDefenderUninstall.bat, which appeared (based on subsequent EDR telemetry) to include attempts to remove various security tools. Based on several MsiInstaller messages observed in the investigative timeline, several of these attempts succeeded. Finally, the threat actor launched the Akira ransomware via commands such as the following:

win_locker.exe -remote -n=3 -p=\\192.168.x.x\C$

In this incident, the threat actor took advantage of remote access (RDP) that was widely enabled throughout the infrastructure without the benefit of MFA, and then installed not one, not two, but three different RMM tools.


Conclusion

A solid security foundation starts with an accurate asset inventory, because you can’t secure what you don’t know you have. This inventory consists not only of physical and virtual assets, but also includes the applications that should be (in accordance with the business use) running on the systems.

Once you have an accurate inventory, the next step is to perform attack surface reduction, configuring those systems for resiliency in accordance with their business use. For example, the Bitdefender blog post regarding RedCurl ransomware describes the initial access vector as a phishing email with an attached .img file; when a user double-clicks this file, by default, Windows will automatically mount and open the file, presenting the user with whatever is inside the file. This functionality often has no legitimate business use and poses a risk to the environment; as such, default behavior can be disabled without impacting the overall business function of the endpoint using the method described in the Huntress blog post, “Addressing Initial Access.”

Once these steps have been completed, apply security tooling for the appropriate level of visibility for your organization. EDR and similar monitoring tools should be installed on all endpoints within the infrastructure, as any gaps in coverage leave an opening for threat actors to exploit. 



Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Daisy-Chaining Rogue RMM Tools: How Threat Actors Abuse Remote Management Software for Initial Access

    The abuse of remote monitoring and management (RMM) tools is surging. See how threat actors daisy chain RMM software for initial access, persistence, and detection evasion.
  • Insights: RMM Tools

    Over the past year, the Huntress team has posted a number of blog posts related to remote monitoring and management (RMM) tools being installed or abused by threat actors.
  • A Series of Unfortunate (RMM) Events

    Recently, the Huntress SOC has observed threat actors increasingly use PDQ and GoTo Resolve to deploy further remote monitoring and management (RMM) tools in attacks.
  • RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. I

    Four years after the Kaseya supply chain attack, a recent incident shows how threat actors still successfully target MSPs’ downstream customers through RMM software.
  • RMMs: A Gateway for Bulk Attacks on MSP Customers, Pt. II

    When a threat actor exploited an MSP's RMM tool to target businesses, Huntress investigated and uncovered another eerily similar incident with key differences that reveal evolving tactics
  • Employee Monitoring and SimpleHelp Software Abused in Ransomware Operations

    Huntress uncovers ransomware operations abusing employee monitoring software and SimpleHelp RMM for persistence, and ransomware deployment.
  • Threat Advisory: XMRig Cryptomining By Way Of TeamViewer

    Huntress has recently seen an uptick in compromised TeamViewer accounts being used to install the XMRig cryptocurrency miner. Dive into the analysis here.
  • Ransomware Deployment Attempts Via TeamViewer

    Huntress analysts continue to observe access to endpoints via legacy TeamViewer installations, and/or compromised TeamViewer credentials.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy