The Power and Peril of RMM Tools 

Discover real-world examples of RMM exploits and learn how to protect your organization from these attacks.
Tom Barnea
4 min read
Last updated July 22, 2024
Remote Management Tools

The conventional office setting has changed in recent years as more people work from home and living room workstations, creating a new hybrid work model. IT departments must now deal with various devices distributed over different cities and countries, relying on VPNs and remote monitoring and management (RMM) tools for system administration. 

However, like any new technology, RMM tools can also be used maliciously. Threat actors establish connections to a victim’s device and run commands, exfiltrate data, and stay undetected. 

This article will cover real-world examples of RMM exploits and show you how to protect your organization from these attacks. 

What are RMM tools? 

RMM software has simplified network management, allowing IT professionals to remotely solve problems, install software, and upload or download files to or from the devices. 

Unfortunately, this connection is not always secure, and attackers can use malicious software to connect their servers to a victim’s device. As these connections become easier to detect, however, ransomware-as-a-service (RaaS) groups have had to adjust their methods. 

In most of the cyber incidents Varonis investigated last year, RaaS gangs employed a technique known as Living off the Land, using legitimate IT tools to gain remote control, navigate networks undetected, and steal data. 

The primary advantage for attackers using RMM tools is their ability to blend in and evade detection, as these tools and their traffic are typically "ignored" by both security controls and organizational security policies, such as application whitelisting.

This tactic also helps "script kiddies," less skilled hackers, who, once connected, find everything they need already installed and ready for them. 

Our research identified two main methods attackers use to manipulate RMM tools: 

  1. Abuse existing RMM tools: Attackers gain initial access to an organization's network using preexisting RMM tools. They exploit weak or default credentials or tool vulnerabilities to gain access without triggering detection. 
  2. Install new RMM tools: Attackers install their preferred RMM tools by first gaining access to the network. They use phishing emails or social engineering techniques to trick victims into unwittingly installing the RMM tool on their network. 

Below are common RMM tools and RaaS gangs: 

Blog_RMMTools_InCopyImage-1_FNL-V2Common RMM tools and RaaS gangs

Real-world examples of RMM exploits 

During a recent investigation, our Managed Data Detection and Response (MDDR) team analyzed an organization’s data and found, in the PowerShell history of a compromised device, evidence of an RMM tool named “KiTTY.”

This software was a modified version of PuTTY, a well-known tool for creating telnet and SSH sessions with remote machines. Because PuTTY is a legitimate RMM tool, none of the organization’s security software raised any red flags, so KiTTY was able to create reverse tunnels over port 443 to expose internal servers to an AWS EC2 box. 

The Varonis team conducted a comprehensive analysis and found that the sessions to the AWS EC2 box using KiTTY were key to revealing what happened, how it was done, and — most importantly — what files were stolen.

This crucial evidence was a turning point in the investigation and helped us trace the entire attack chain. It also showed the organization its security gaps, how to address them, and the potential consequences of this attack. 

Strategies to defend RMM tools 

To reduce the chance of attackers abusing RMM tools, consider implementing the following strategies.

An application control policy 

Restrict your organization from using multiple RMM tools by enforcing an application control policy:

  • Ensure RMM tools are updated, patched, and accessible only to authorized users with MFA enabled 
  • Proactively block both inbound and outbound connections on forbidden RMM ports and protocols at the network perimeter 

One option is to create a Windows Defender Application Control (WDAC) policy using PowerShell that whitelists applications based on their publisher. It’s important to note that creating WDAC policies requires administrative privileges and deploying them via Group Policy requires domain administrative privileges.

As a precaution, you should test the policy in audit mode before deploying it in enforce mode to avoid inadvertently blocking necessary applications.

  1. Open PowerShell with administrative privileges
  2. Create a new policy: You can create a new policy using the New-CIPolicy cmdlet. This cmdlet takes a path to a directory or a file, scans it, and makes a policy that allows all files in that path, such as executables and DLL files, to run on your network. 

    For example, if you want to allow everything signed by the publisher of a specific application, you can follow the example below: 
    New-CIPolicy -FilePath "C:\Path\To\Application.exe" -Level Publisher -UserPEs -Fallback Hash -Enable -OutputFilePath "C:\Path\To\Policy.xml"

    In this command, -FilePath specifies the path to the application, -Level Publisher means that the policy will allow everything signed by the same publisher as the application, and -UserPEs means that the policy will include user-mode executables.

    -Fallback Hash means that if the file is not signed, the policy will allow it based on its hash, -Enable means that the policy will be enabled, and -OutputFilePath specifies the path where the policy will be saved. 
  3. Convert the policy to a binary format: WDAC policies must be deployed in a binary format. You can convert the policy using the ConvertFrom-CIPolicy cmdlet: 
    ConvertFrom-CIPolicy -XmlFilePath "C:\Path\To\Policy.xml" -BinaryFilePath "C:\Path\To\Policy.bin"
  4. Deploy the policy: You can deploy the policy using the group policy management console (GPMC). To do this, you must copy the .bin file to the \\Windows\System32\CodeIntegrity directory on each computer where you want to deploy the policy. Then, you need to set the Computer Configuration → Administrative Templates → System  Device Guard → Deploy Windows Defender Application Control policy setting to Enabled and set the Use Windows Defender Application Control to help protect your device option to Enforce.

Continuous monitoring 

Monitor your network traffic and logs, especially regarding RMM tools. Consider implementing services like Varonis MDDR, which provides 24x7x365 network monitoring and behavioral analysis. 

User training and awareness 

Train your employees to identify phishing attempts and manage passwords effectively, as manipulating users is a common way attackers gain access to your network. Encourage the reporting of suspicious activity and regularly test your cybersecurity team to identify potential risks. 

Reduce your risk without taking any.

As technology advances, it gives an edge to both defenders and attackers, and RMM tools are just one example of the potential threats orgs face. 

At Varonis, our mission is to protect what matters most: your data. Our all-in-one Data Security Platform continuously discovers and classifies critical data, removes exposures, and stops threats in real time with AI-powered automation. 

Curious to see what risks might be prevalent in your environment? Get a Varonis Data Risk Assessment today.

Our free assessment takes just minutes to set up and delivers immediate value. In less than 24 hours, you’ll have a clear, risk-based view of the data that matters most and a clear path to automated remediation.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

🚨-massive-ransomware-outbreak:-what-you-need-to-know
🚨 Massive Ransomware Outbreak: What You Need To Know
Remember those NSA exploits that got leaked a few months back? A new variant of ransomware using those exploits is spreading quickly across the world – affecting everyone from the...
eternalrocks-leaves-backdoor-trojan-for-remote-access-to-infected-machines
EternalRocks leaves backdoor trojan for remote access to infected machines
What we know so far The WannaCry ransomware worm outbreak from last Friday week used just one of the leaked NSA exploit tools, ETERNALBLUE, which exploits vulnerabilities in the SMBv1...
varonis-gets-lightning-fast-with-solr
Varonis Gets Lightning Fast with Solr
Any security practitioner that has had to perform forensic analysis on a cybersecurity incident likely describes the process as “searching for a needle in a stack of needles.” Even Tony...
zero-day-vulnerability-explained
Zero-Day Vulnerability Explained
Find out how zero-day vulnerabilities become zero-day exploits and zero-day attacks, and how to defend your network from zero-day attacks and exploits.