Skip to main content
Mallory
Mallory

Phishing Campaigns Weaponize Legitimate RMM Tools for Remote Access and Credential Theft

phishingcredential theftremote accessrmmprivilege escalationdata exfiltrationbrand impersonationtelegram botsdefense evasioncmd scriptlogmein resolvewindows smartscreenmark-of-the-weblookalike domainsconnectwise screenconnect
Updated February 18, 2026 at 09:03 AM2 sources
Phishing Campaigns Weaponize Legitimate RMM Tools for Remote Access and Credential Theft

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Threat researchers reported multiple phishing-driven intrusions in which attackers impersonate trusted brands and agencies to trick victims into installing legitimate remote monitoring and management (RMM) software for persistent access. In Operation DoppelBrand, financially motivated actor GS7 spoofed Fortune 500 financial and technology brands (including Wells Fargo and USAA) using more than 150 lookalike domains to harvest credentials and exfiltrate data via attacker-controlled Telegram bots; researchers also identified nearly 200 additional domains with short registration terms, automated SSL, wildcard DNS, and brand-specific subdomains supporting the campaign.

Separately, Forcepoint X-Labs described a wave of emails impersonating the U.S. Social Security Administration that delivers an attached .cmd script to weaken Windows defenses and enable silent installation of ConnectWise ScreenConnect. The script checks/elevates privileges, disables Windows SmartScreen via registry changes, removes Mark-of-the-Web, and uses Alternate Data Streams (ADS) for stealth before installing an MSI and configuring ScreenConnect (via System.config) to beacon to an attacker-controlled server (reported as dof-connecttop on port 8041). Both activity sets highlight a recurring tradecraft pattern: brand impersonation + scripted defense evasion + abuse of legitimate RMM tooling (e.g., LogMeIn Resolve, ScreenConnect) to gain remote control and facilitate follow-on theft or persistence.

Related Entities

Threat Actors

Affected Products

Related Stories

Phishing Campaigns Abuse Digital Invites and Fake Meeting Pages to Steal Credentials and Deploy RMM Tools

Phishing Campaigns Abuse Digital Invites and Fake Meeting Pages to Steal Credentials and Deploy RMM Tools

Threat actors are abusing the familiarity of **digital invitation and meeting platforms** to increase phishing success rates. Cofense reported malicious *Punchbowl/Paperless Post*-themed invitations that prompt recipients to “log in to view event details,” then redirect to phishing infrastructure offering branded sign-in options (e.g., **Microsoft, Yahoo, AOL, Google, Dropbox**) to harvest credentials. The phishing flow may solicit multiple credential sets by returning fake login errors and urging users to try alternate accounts; submitted credentials are exfiltrated to attacker-controlled domains, often leveraging newly registered domains to evade reputation-based defenses. Separately, Netskope research (reported by KnowBe4) described **fake video meeting invites** for *Zoom, Microsoft Teams, Google Meet,* and similar services that lead to spoofed “join meeting” pages showing purported coworkers already on the call. Victims are instructed to install a required “update” to join; the payload is a **digitally signed remote monitoring and management (RMM) tool** such as *Datto RMM, LogMeIn,* or *ScreenConnect*, enabling remote access and potential follow-on activity including data theft or deployment of additional malware. The use of legitimate, signed RMM software can blend into normal enterprise traffic and may bypass controls where such tools are pre-approved.

2 weeks ago
Operation DoppelBrand Phishing Campaign Impersonating Fortune 500 Brands

Operation DoppelBrand Phishing Campaign Impersonating Fortune 500 Brands

SOCRadar reported a long-running phishing operation dubbed **Operation DoppelBrand**, attributed to a financially motivated actor tracked as **GS7**, that uses high-fidelity replicas of Fortune 500 and major consumer brands to harvest credentials and enable follow-on access. The activity observed most recently (Dec 2025–Jan 2026) impersonated major financial and technology organizations (including **Wells Fargo, USAA, Navy Federal Credit Union, Fidelity, Microsoft, and Citibank**) and relied on a highly automated domain and infrastructure pipeline, with researchers identifying **hundreds of malicious domains** and **150+ newly identified domains** following consistent patterns. The operation is assessed as monetization-focused, with GS7 linked to trading stolen credentials and access in underground markets and using **Telegram bots** for credential handling/exfiltration; reporting also notes abuse of legitimate remote management tooling to help establish persistence after credential capture. Dark Reading’s coverage of the SOCRadar findings emphasized the campaign’s effectiveness stemming from near-perfect portal impersonation and rapid infrastructure rotation, increasing the likelihood of successful credential theft against both enterprises and their customers. For defenders, the reporting highlights the need to treat this as an ongoing, scalable credential-harvesting and initial-access operation: prioritize monitoring for lookalike domains and brand-abuse infrastructure, strengthen anti-phishing controls around customer/employee authentication flows, and review remote management tool governance to reduce the impact of stolen credentials being converted into durable access.

4 weeks ago
Spearphishing Campaigns Abuse PDF and Windows Screensaver Files to Install Legitimate RMM Tools

Spearphishing Campaigns Abuse PDF and Windows Screensaver Files to Install Legitimate RMM Tools

Threat actors have been observed using spearphishing lures and *non-traditional* attachment types—particularly Windows screensaver (`.scr`) executables—to trick users into running code that silently installs legitimate **remote monitoring and management (RMM)** agents (e.g., **SimpleHelp**). ReliaQuest research described business-themed filenames (e.g., `InvoiceDetails.scr`, `ProjectSummary.scr`) delivered via links hosted on legitimate cloud services (e.g., GoFile), with the `.scr` format helping bypass controls that don’t treat screensavers as executables. Once installed, the RMM tooling provides interactive remote access that can enable data theft, lateral movement, and follow-on payload deployment, including ransomware, while blending into normal IT administration traffic. Separately, researchers also reported a spam operation using **fake PDF attachments** that display an error message and redirect victims to a lookalike *Adobe Acrobat* download flow, but instead installs trusted, digitally signed RMM software to establish persistent access. A different phishing campaign used a multi-stage **PDF chain** hosted on reputable infrastructure (e.g., **Vercel Blob**) to redirect victims to a credential-harvesting page and exfiltrate stolen data via a **Telegram bot**, emphasizing how attackers are increasingly abusing high-reputation cloud platforms and document-based lures to evade email and web filtering (including scenarios where the initial email contains no malicious link and can pass SPF/DKIM/DMARC checks).

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.