A recent phishing campaign observed by ProArch SOC shows threat actors weaponizing legitimate remote access software to gain persistent, outbound-controlled access to enterprise endpoints. These attacks deliver malicious MSI installers disguised as official documents, ultimately deploying ScreenConnect-based remote access for persistent control. The campaign reflects a growing trend where legitimate remote management software is weaponized to establish stealthy, outbound-controlled access into enterprise environments.
During the investigation, the ProArch SOC team identified several key indicators of compromise (IOCs):
These indicators suggest that attackers are leveraging automation to rapidly deploy and maintain remote access across multiple systems.
Government-Themed Phishing as Initial Access
Threat actors are distributing phishing emails themed around:
Victims are redirected to download MSI files masquerading as PDF statements or official documents, which actually contains the malicious installer.
Trojanized ScreenConnect Deployment
Rather than using custom malware, attackers deploy modified versions of legitimate remote access software such as ScreenConnect.
Because ScreenConnect is widely used by IT teams for legitimate remote support, its installation may not immediately trigger suspicion unless behavioral monitoring or application allow-listing is in place.
This tactic reflects a broader trend of Remote Monitoring and Management (RMM) tool abuse, where attackers use trusted software to blend in with normal IT operations.
Outbound Relay-Based Remote Access
Unlike traditional backdoors that open inbound ports, ScreenConnect establishes outbound connections to external relay servers controlled by the attacker.
Abuse of remote access tools such as ScreenConnect introduces several significant risks for organizations:
Harden Against Malicious MSI Installers
Organizations should restrict the execution of MSI installers when they are not required for business operations.
Recommended controls include:
Monitor Outbound Relay Patterns
Strengthen User Awareness Against Phishing
Users remain a critical defense layer against phishing-based attacks.
Regular phishing awareness training significantly reduces the risk of users executing malicious attachments.
Modern cyberattacks increasingly rely on legitimate tools instead of traditional malware, making them harder to detect with legacy security solutions.
Security teams need continuous monitoring, behavioral analytics, and rapid response capabilities to detect these stealthy attacks early.
ProArch’s Managed Detection and Response (MDR) services help organizations identify suspicious activity such as:
By combining 24/7 SOC monitoring, threat intelligence, and rapid incident response, ProArch helps organizations contain threats before they impact business operations.