Back to Intelligence

Weaponizing Admin Tools: The Rise of RMM Abuse in Cyberattacks

SA
Security Arsenal Team
March 3, 2026
5 min read

Imagine a burglar breaking into your house not by smashing a window or picking a lock, but by simply walking in through the front door wearing a convincing uniform. This is the reality of the latest shift in the cybersecurity landscape: the weaponization of Remote Monitoring and Management (RMM) software.

The Shift from Malware to 'Good' Tools

For years, the standard playbook for cybercriminals involved developing or purchasing custom malware. While effective, this approach has become noisy. Antivirus solutions, EDR platforms, and heuristic analysis engines have become incredibly adept at flagging unsigned binaries and suspicious code patterns.

To adapt, threat actors are "ditching malware" in favor of a strategy known as "Living Off the Land" (LotL). Rather than bringing their own tools, they are abusing the trusted administrative software already present—or easily deployable—within victim environments. RMM platforms, designed for legitimate IT support, have become the weapon of choice. These tools provide hackers with the holy trinity of attack capabilities: stealth, persistence, and operational efficiency.

The Tactical Advantage of RMM Abuse

Why are RMM tools so dangerous in the wrong hands?

  1. Inherent Trust: RMM agents are typically signed by legitimate software vendors and are whitelisted by default in many environments. This allows attackers to execute commands, move laterally, and exfiltrate data without triggering traditional antivirus alerts.
  2. Persistence: Once installed, RMM agents are designed to survive reboots and maintain constant connections to a C2 (Command and Control) server. This gives hackers a persistent backdoor that is difficult to distinguish from legitimate IT maintenance.
  3. Efficiency: Hackers no longer need to write custom code for data theft. They can use the built-in file transfer and remote desktop features of the RMM software itself.

Attack Vector Analysis

Typically, the attack chain begins with an initial access vector—often a phishing email or an exploited vulnerability on a public-facing server. Once the attacker has a foothold (often via PowerShell or a web shell), they download a portable version of a popular RMM tool (e.g., ScreenConnect, AnyDesk, Atera, or Syncro).

Once the agent is executed, it establishes an outbound connection to the vendor’s infrastructure or a proxy server controlled by the attacker. Because the traffic is encrypted and looks like standard administrative traffic, network firewalls often allow it to pass.

Detection and Threat Hunting

Detecting RMM abuse requires a shift from looking for "bad" files to looking for "bad" behavior. Security teams must monitor for the installation of RMM software on endpoints where it shouldn't be, and watch for legitimate tools being used in anomalous ways.

KQL Queries for Microsoft Sentinel/Defender

The following KQL query helps identify suspicious process execution patterns related to common RMM tools.

Script / Code
// Hunt for suspicious RMM process execution
let RMMProcesses = dynamic(["AnyDesk.exe", "screenconnect.client.exe", "AteraAgent.exe", "Splashtop_Streamer.exe", "connectwisecontrol.client.exe", "RemoteUtilities.exe", "SyncroApp.exe"]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ RMMProcesses
// Exclude known good paths or administrative stations if necessary
| where InitiatingProcessAccountName !in~ ("SYSTEM", "LOCAL SERVICE") 
| where InitiatingProcessFileName !in~ ("explorer.exe", "services.exe") 
| project Timestamp, DeviceName, AccountName, FileName, FolderPath, InitiatingProcessFileName, SHA256
| order by Timestamp desc

This query filters for specific executable names associated with popular RMM tools and excludes executions initiated by system accounts or the Windows explorer shell, which often indicates manual administrative use.

PowerShell Audit Script

You can use the following PowerShell script to audit running processes on a specific machine for active RMM connections that may be unauthorized.

Script / Code
# Audit Running RMM Processes
$SuspiciousRMM = @("AnyDesk", "ScreenConnect", "AteraAgent", "Splashtop", "RemoteUtilities", "SyncroApp")

Get-Process | Where-Object { $SuspiciousRMM -like $_.ProcessName } | ForEach-Object {
    Write-Host "ALERT: Found RMM Process - $($_.ProcessName) (PID: $($_.Id))"
    Write-Host "Path: $($_.Path)"
    Write-Host "Start Time: $($_.StartTime)"
    Write-Host "----------------------------------------"
}

Mitigation Strategies

Stopping RMM abuse requires a layered defense strategy that goes beyond simple antivirus:

  1. Strict Software Allow-listing: Implement application control policies (e.g., AppLocker or Windows Defender Application Control) that prevent the execution of unauthorized RMM binaries. Only allow specific, signed versions to run from designated directories.
  2. Network Segmentation: Restrict which endpoints can communicate with known RMM vendor infrastructure. Critical servers should generally not have internet access required for consumer-grade RMM tools.
  3. Service Account Hygiene: Ensure that IT staff do not use RMM tools with domain administrator privileges. Enforce Principle of Least Privilege (PoLP) for all remote access sessions.
  4. Behavioral Monitoring: Deploy EDR solutions that focus on behavioral analytics rather than just signature matching. Flag anomalies such as an RMM tool spawning a command shell or making excessive network connections in a short timeframe.

Conclusion

The weaponization of RMM software is a stark reminder that the definition of malware is evolving. In the modern threat landscape, "trusted" software is often the most dangerous weapon. By implementing strict allow-listing and behavioral hunting, you can close the door on attackers trying to walk right in.

Related Resources

Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub

socmdrmanaged-socdetectionliving-off-the-landthreat-huntingrmm-attackslolbins

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.