Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:14)
From phishing to ransomware, cyber threats are constant. But with Nordlayer, your defense can be too. Nordlayer brings together secure access and advanced threat protection in a single, seamless platform. It helps your team spot suspicious activity before it becomes a problem by blocking, blocking malicious links and scanning downloads in real time, preventing malware from reaching your network. It's quick to deploy, easy to scale, and built on zero trust principles. So only the right people get access to the right resources. Get 28% off on a yearly plan@nordlayer.com cyberwire daily with code CYBERWIRE28. That's nordlayer.com cyberwire daily code CYBERWIRE28. That's valid through December 10th, 2025. Hello, everyone, and welcome to the Cyberwires Research Saturday. I'm Dave Buettner, and this is our weekly conversation with researchers and analysts, tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
A (1:40)
So remote monitoring and management tools basically allow remote users to access and administer devices with ease, so they can be used by internal IT operations daily. So they're used for things like applying updates, managing assets, deploying software, things like that. The biggest issue here is that because they have all of these features, they're also leveraged by adversaries. And IT really allows adversaries to blend in or even impersonate an organization's IT or a vendor. And they really allow adversaries to start to have that persistent access and then start to move laterally.
B (2:21)
That's Alex Berninger, senior manager of intelligence at Red Canary, and. And Mike Wiley, director of threat hunting at Zscaler. The research we're discussing today tracks four phishing lures and campaigns dropping RMM tools. Well, Mike, the team here identified the campaigns using a variety of tools. Can you walk us through what exactly you all discovered here?
A (2:54)
Sure.
C (2:55)
So, coming from the vendor side, we've got a unique perspective. We've coined this term Hawkeye hunting. And essentially what that means is that when you're defending your own organization, it's kind of like looking out of the captain's chair, the windows of a battleship. And you only have certain perspective, right? You can see about 2.9 nautical miles before there's the curvature of the earth. So you have this limited visibility. With our visibility, we can dip into the metadata. So think of somewhat similar to NetFlow or DNS logs, firewall logs of the Zero Trust Exchange. And so in that we're able to see fast moving campaigns, we're able to tie pieces together, whereas an organization defending their own battleship, they can only see what's right in front of them. And so what we were doing is we were looking for different abuse, I would say, or leveraging from a threat actor of these legitimate resources. And so we have these hunts that are ran 24. Seven for looking at things like abuse of S3 buckets or Cloudflare R2 buckets. And what our team discovered was that at the peak of the campaign, we were seeing about 100 instances of this per week where these legitimate remote desktop tools were being packaged up in an MSI and they were then being hosted at these trusted resources. So we often see GitHub, things like file sharing, storage solutions, R2 buckets. And they're putting these legitimate signed binaries which as Alex said, they are used by IT personnel for legitimate reasons and they're downloaded from a legitimate resource. So we're not seeing evil.com or some attacker owned infrastructure. They're using legitimate third party tools, legitimate websites, legitimate resources on the web for this campaign. And then what they're doing is that they're renaming these tools. So rather than being something like pdq, MSI or anydesk msi, they're naming them things that you wouldn't normally see from a IT department. So the one I saw most recently was W9.2025 MSI. So they're masquerading the file names and then using these trusted resources. And we saw that happening more and more. And as we saw that, we expanded our hunting methodology. And then we were able to see again at the peak of this, about 100 different events within the course of a week.
![Two RMMs walk into a phish… [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F03f50802-c716-11f0-881c-4fa5fbd6d1da%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)