A sophisticated phishing campaign leveraging legitimate remote management tools like SimpleHelp and ScreenConnect has compromised over 80 organizations.
This attack highlights a dangerous evolution in cyber threats—trusted tools are now being weaponized to bypass traditional defenses.
For security leaders, this signals a critical shift in how endpoint and identity threats must be managed.
What Happened
The campaign, tracked as VENOMOUS#HELPER, has been active since April 2025 and primarily targets U.S.-based organizations.
- Attack begins with phishing emails impersonating the U.S. Social Security Administration
- Victims are tricked into downloading a malicious executable disguised as an official document
- The payload installs SimpleHelp RMM for persistent remote access
- Attackers gain SYSTEM-level privileges and full desktop control
- A secondary tool, ScreenConnect, is deployed as a fallback access channel
- The attack uses legitimate, signed software to evade detection
Security researchers from Securonix identified overlaps with activity clusters tracked by Red Canary and Sophos.
Why This Matters
This campaign reflects a major evolution in attacker tactics:
1. Living-Off-the-Land Attacks Are Increasing
Attackers are using legitimate tools instead of malware, making detection significantly harder.
2. Dual Access Persistence Is the New Standard
By deploying both SimpleHelp and ScreenConnect, attackers ensure redundant access, even if one channel is blocked.
3. Identity and Endpoint Are Blurring
With SYSTEM-level privileges, attackers can:
- Move laterally
- Steal credentials
- Maintain long-term persistence
This aligns with broader trends:
- Rise of Initial Access Brokers (IABs)
- Ransomware pre-positioning strategies
- Increased abuse of SaaS and IT tools
Impact on Buyers
This development impacts enterprise buyers in three major ways:
Risk Exposure
- Legitimate tools bypass traditional antivirus and EDR detection
- Persistent, stealthy access increases breach dwell time
- Expanded attack surface across endpoints and SaaS tools
Operational Pressure
- Need for behavioral detection instead of signature-based security
- Increased monitoring of legitimate software usage
- Greater emphasis on identity and privilege management
Budget Implication
- Increased investment in:
- Endpoint Detection & Response (EDR/XDR)
- Identity Threat Detection & Response (ITDR)
- Zero Trust frameworks
- Security awareness and phishing simulation tools
Demand Signal
This campaign signals rising demand for:
- Advanced Endpoint Detection & Response (EDR/XDR)
- Identity Threat Detection & Response (ITDR)
- Zero Trust Security Solutions
- Phishing Protection & Email Security Platforms
- Privileged Access Management (PAM)
Vendors that can detect behavior, not just malware, will win.
What Security Leaders Should Do
Immediate Actions
- Audit all RMM tools installed across endpoints
- Block unauthorized or unused remote access software
- Alert users about phishing campaigns impersonating government entities
Strategic Adjustments
- Implement behavioral analytics for endpoint activity
- Enforce strict privilege controls and monitoring
- Strengthen email security and phishing detection
Long-Term Investments
- Adopt Zero Trust architecture
- Integrate identity and endpoint security
- Invest in continuous threat hunting and intelligence
Who Should Care
- CISOs
- Security Operations (SOC) Teams
- Endpoint Security Leaders
- IT & Risk Management Teams
Related Trends
- Living-off-the-land attacks (LOLBins)
- Zero Trust adoption
- Identity-first security
- SaaS and tool-based attack vectors
Data Callout
Studies show that over 70% of modern attacks now use legitimate tools or credentials, making traditional detection methods less effective.
CyberTech Intelligence POV
At CyberTech Intelligence, this campaign reinforces a critical reality:
Attackers are no longer breaking in—they’re logging in.
Demand is being driven by stealth, not noise. Organizations that recognize these subtle signals early will be better positioned to convert risk into proactive security investments.
Understand how this threat impacts your security posture and pipeline.
Get your Demand Activation Blueprint
Source : gbhackers.com
Recommended Cyber Technology News :
- IntelligenceBank Launches AI Logo Detection Tool
- CISA, Global Partners Issue Agentic AI Security Guide
- HighWire, MEI Launch Secure Digital Journal Platform
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading




