Who’s watching who? Experts reveal criminals using fake enterprise software to gain access to company systems



  • Proofpoint uncovered fake RMM tool “TrustConnect” built as cover for RAT malware
  • Criminals created website, paid for certificate, tricking firms into $300/month subscriptions
  • Tool gave attackers full remote control; linked to Redline infostealer customer

A group of cybercriminals went to great lengths to infect businesses with a remote access trojan (RAT), setting up an entire company, vibe-coding a website, and paying thousands for a legitimate certificate.

In its report, Proofpoint said it was fairly common for cybercriminals to use legitimate remote monitoring and management (RMM) tools in their tech stack. They would trick their victims into installing their tool of choice and sharing login credentials which would enable them to deploy all sorts of stage-two malware, including infostealers, remote access trojans, or ransomware.


https://cdn.mos.cms.futurecdn.net/jt92kXfBXVXUWwnKBmDJLn-2560-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img