Skip to main content
Mallory
Back to intelligence
phishing-campaign-intelligenceremote-access-implantinitial-access-methodthreat-infrastructure-tracking

VENOMOUS#HELPER Phishing Campaign Abuses SimpleHelp and ScreenConnect for Stealthy Access

Updated 20d agoFirst seen Apr 21, 20264 sources

A phishing campaign tracked as VENOMOUS#HELPER has compromised more than 80 organizations since at least April 2025, primarily in the United States, with additional victims in Western Europe and Latin America. Attackers used emails impersonating the U.S. Social Security Administration to drive targets to fake SSA pages hosted via compromised legitimate websites, including a Mexican domain used to help evade filtering. Victims who downloaded the fake SSA statement executable installed vendor-signed remote monitoring and management tools instead of conventional malware, giving the operators covert access through SimpleHelp and ConnectWise ScreenConnect.

Researchers said the malware chain deployed a self-hosted SimpleHelp 5.0.1 instance packaged with JWrapper and a separate ScreenConnect relay, creating redundant remote access if one channel was blocked. The installed tooling persisted as a Windows service, survived Safe Mode, polled for Wi-Fi status, firewall state, security products, user activity, and mouse movement, and in some cases renamed wmic.exe to evade name-based detections. Separate infrastructure analysis linked a signed SimpleHelp client to a five-server command-and-control cluster on 147.45.218.0/24, a Russian-language portal at dangerstock[.]online, and an exposed Cockpit dashboard, with Fortinet tracking the infrastructure as PALLASNET.M; Securonix assessed the broader activity as consistent with a financially motivated initial access broker or ransomware precursor.

Share:
VENOMOUS#HELPER Phishing Campaign Abuses SimpleHelp and ScreenConnect for Stealthy Access
Stay ahead

Get ahead of threats like this

Mallory correlates global threat intelligence with your attack surface — know if you’re exposed before adversaries strike.

EVENT TIMELINE

How this story unfolded

8 events from the most recent confirmed update back to the earliest known activity.

8 EVENTS
May 4, 202621d ago

Media reports amplify Securonix findings on 80+ victim campaign

On May 4, 2026, Dark Reading and The Hacker News reported Securonix's findings that VENOMOUS#HELPER had targeted more than 80 organizations using SimpleHelp and ScreenConnect. These reports did not introduce a separate incident but broadened public reporting on the campaign and its likely financially motivated initial-access or ransomware-linked nature.

Apr 26, 202629d ago

Securonix publishes VENOMOUS#HELPER campaign analysis

On April 26, 2026, Securonix published research detailing the VENOMOUS#HELPER phishing campaign's use of dual legitimate RMM tools, SimpleHelp and ScreenConnect, for stealthy persistence and redundant remote access. The report described compromised websites, a fake SSA statement executable, host surveillance behavior, and evasion techniques such as renaming wmic.exe.

Apr 20, 20261mo ago

Four PALLASNET servers still expose SimpleHelp portals

At the time of Breakglass publication, four of the five identified servers were still serving SimpleHelp customer download portals, while the primary 147.45.218.66 server had been hardened to agent-only behavior. Researchers also observed ScreenConnect used alongside SimpleHelp, indicating a dual-RAT persistence strategy.

Breakglass maps five-server PALLASNET SimpleHelp cluster

On April 20, 2026, Breakglass published analysis connecting a signed SimpleHelp client sample to a five-server command-and-control cluster on 147.45.218.0/24 and a Russian-language portal at dangerstock[.]online. The report also noted a stolen Google Analytics certificate, an exposed Cockpit dashboard, and Fortinet tracking the infrastructure as PALLASNET.M.

Apr 1, 20262mo ago

Fresh malware samples tied to PALLASNET appear

Breakglass said new malware samples linked to the PALLASNET infrastructure were still appearing in April 2026, indicating the operation remained active. The analyzed sample was a legitimately signed SimpleHelp Remote Access Client configured to call back to 147.45.218.66:443.

Sep 1, 20259mo ago

SimpleHelp deployments observed on PALLASNET-linked servers

Breakglass observed SimpleHelp deployments on the PALLASNET-associated infrastructure beginning in September 2025. The cluster ultimately included five servers, with several exposing SimpleHelp customer download portals.

Aug 1, 202510mo ago

PALLASNET infrastructure subnet is allocated

Breakglass reported that the 147.45.218.0/24 subnet tied to the PALLASNET cluster was allocated in August 2025. Researchers later linked this network to a five-server command-and-control cluster supporting SimpleHelp and ScreenConnect-based remote access operations.

Apr 1, 20251y ago

VENOMOUS#HELPER phishing campaign begins targeting organizations

Securonix said the VENOMOUS#HELPER campaign has been active since at least April 2025, using phishing emails and fake U.S. Social Security Administration-themed pages to trick victims into downloading a malicious executable. The activity has affected more than 80 organizations, primarily in the United States, with additional victims in Western Europe and Latin America.

LINKED ENTITIES

Related entities

Vulnerabilities, threat actors, malware, products, organizations, and breaches Mallory has linked to this story.

19 LINKEDOpen in app
The operational view lives in Mallory

See the full picture, correlated to your attack surface.

This page covers what’s public. Mallory adds the parts that aren’t — which of your assets are affected, which threat actors are using it right now, which detections to deploy, and what to do next.
Exposure mapping

Map indicators from this story to your assets and identify affected systems in minutes.

Threat actor evidence

Every observed campaign, victim, and pivot linked to actors named in this story.

Associated malware

Malware, exploits, and IOCs connected to the activity described here.

Detection signatures

YARA, Sigma, and Snort rules deployed to your SIEM as soon as they’re published.

Scheduled alerts

Get matching new stories delivered to your team as they break — not the next morning.

AI threads

Ask questions about this story and take action on the answers.

VENOMOUS#HELPER Phishing Campaign Abuses SimpleHelp and ScreenConnect for Stealthy Access | Mallory