Frequently Asked Questions

Threats & Security Risks

What is the main threat described in the US-CERT Alert AA23-025A?

The US-CERT Alert AA23-025A highlights the malicious use of Remote Monitoring and Management (RMM) software by threat actors. Attackers use portable executables of RMM tools to establish local user access without administrative privileges, bypassing common software controls and risk management assumptions. This technique enables persistent access, evasion of detection, and can facilitate financial scams or further malicious activity.

How do attackers use RMM software to bypass security controls?

Attackers download RMM tools like AnyDesk and ScreenConnect as portable executables, which do not require installation or administrative privileges. This allows them to execute unapproved software, evade software management controls, and establish persistent access as a local user service, even if standard installations are blocked by security policies.

What types of organizations are most at risk from RMM-based attacks?

Managed Service Providers (MSPs), IT help desks, and organizations that rely on remote IT support, network management, or endpoint monitoring are particularly at risk. A compromise of an MSP can lead to mass exploitation, affecting numerous downstream clients with threats like ransomware and cyber espionage.

How do phishing campaigns facilitate RMM-based attacks?

Phishing emails are used to lure victims into visiting malicious domains or calling attacker-controlled phone numbers. These emails often impersonate well-known brands and IT support services. Once the victim visits the malicious site, they are prompted to download a portable RMM executable, which gives attackers remote access to their system.

What are the risks of using portable RMM executables?

Portable RMM executables can bypass software management controls and administrative privilege requirements, making them difficult to detect and block. They can be used to execute unapproved software, attack other machines within the local intranet, and establish persistent backdoors for long-term access.

How do attackers use RMM tools for financial scams?

Attackers use RMM tools to connect to victims' systems and trick them into logging into their bank accounts. They then modify the account summary to show a false excess refund and convince the victim to "refund" the excess amount, which is sent directly to the attacker.

What mitigation measures are recommended to defend against malicious RMM use?

The US-CERT advisory recommends implementing the mitigation strategies outlined in the Cybersecurity Advisory (CSA), such as restricting the use of portable executables, monitoring for unauthorized RMM activity, and educating users about phishing risks. For more details, refer to the official CSA document.

Why are antivirus and antimalware tools often ineffective against RMM misuse?

Because attackers use legitimate RMM software as portable executables, these tools may not be flagged as malicious by antivirus or antimalware solutions. This allows attackers to avoid detection and maintain persistent access without deploying custom malware.

What brands are commonly impersonated in RMM phishing campaigns?

Threat actors often impersonate brands such as Amazon, Microsoft, Geek Squad, McAfee, Norton, and PayPal in their phishing campaigns to increase the likelihood of victims trusting and acting on the malicious emails.

How can organizations detect and respond to RMM-based attacks?

Organizations should monitor for unauthorized downloads and execution of RMM tools, restrict the use of portable executables, and educate users about phishing tactics. Implementing continuous security validation and exposure management solutions, like Cymulate, can help identify and remediate gaps in defenses against such attacks.

Features & Capabilities

What is Cymulate's Exposure Management Platform?

Cymulate's Exposure Management Platform is a unified solution that enables organizations to continuously validate their cybersecurity defenses, identify vulnerabilities, and optimize their security posture. It integrates Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics into a single platform for comprehensive threat resilience. Learn more.

What are the key features of Cymulate's platform?

Key features include continuous threat validation, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, an extensive threat library with over 100,000 attack actions, and an intuitive, user-friendly interface. These features help organizations improve security posture, operational efficiency, and threat resilience. Details here.

How does Cymulate help defend against threats like malicious RMM use?

Cymulate simulates real-world attack scenarios, including those involving RMM misuse, to validate the effectiveness of security controls. It provides actionable insights, automated mitigation, and continuous validation to help organizations detect, prioritize, and remediate exposures before attackers can exploit them.

Does Cymulate integrate with other security tools?

Yes, Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit the Partnerships and Integrations page.

How does Cymulate's Threat (IoC) updates feature improve threat resilience?

Cymulate's Threat (IoC) updates feature provides recommended Indicators of Compromise (IoCs) that can be exported and applied directly to security controls. This helps control owners quickly build defenses against new threats, improving overall threat resilience. (Source: EM Platform Message Guide.pdf)

What is the benefit of Cymulate's immediate threats module?

According to a Penetration Tester, Cymulate's immediate threats module is updated quickly, allowing organizations to assess their risk from new attacks and implement remedial action rapidly. This ensures timely protection against emerging threats. (Source: https://cymulate.com/#tab-otherattacksimulationplatforms)

How does Cymulate Exposure Validation support a threat-informed defense strategy?

Cymulate Exposure Validation continuously validates security controls against the latest threats and attack techniques, ensuring defenses are always prepared for current and emerging adversarial methods. Learn more.

What specific Cymulate offerings are included in the Threat Validation solution?

The Threat Validation solution includes Cymulate Exposure Validation, Cymulate Auto Mitigation (optional), and Cymulate Custom Attacks (optional), all delivered via the Cymulate Exposure Management Platform. (Source: EM Platform Message Guide.pdf)

How does Cymulate's Threat Validation differ from manual pen tests and traditional BAS?

Cymulate provides automated, continuous security testing with a library of over 100,000 attack actions, easy out-of-the-box control integrations, and automated mitigation. This approach overcomes the limitations of infrequent manual tests and cumbersome traditional BAS tools. (Source: EM Platform Message Guide.pdf)

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, Red Teams, and Vulnerability Management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. Learn more.

What problems does Cymulate solve for security teams?

Cymulate addresses challenges such as fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. (Source: EM Platform Message Guide.pdf)

How does Cymulate help organizations prioritize risk?

Cymulate validates exploitability and ranks exposures based on prevention and detection capabilities, business context, and threat intelligence, enabling organizations to focus on the most critical vulnerabilities. (Source: EM Platform Message Guide.pdf)

What measurable outcomes have customers achieved with Cymulate?

Customers have reported a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. For example, Hertz Israel reduced cyber risk by 81% in four months using Cymulate. Read the case study.

How easy is it to implement Cymulate?

Cymulate is designed for quick and easy implementation, operating in agentless mode with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment. (Source: manual)

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly interface and actionable insights. For example, Raphael Ferreira, Cybersecurity Manager, said, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." (Source: https://cymulate.com/schedule-a-demo/)

Are there case studies showing Cymulate's effectiveness?

Yes, Cymulate features numerous case studies across industries. For example, Hertz Israel reduced cyber risk by 81% in four months, and a sustainable energy company scaled penetration testing cost-effectively. See all case studies.

How does Cymulate address the needs of different security roles?

Cymulate tailors its solutions for CISOs (providing metrics and insights), SecOps teams (automating processes), Red Teams (offensive testing with a large attack library), and Vulnerability Management teams (automated validation and prioritization). Learn more.

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected. For a detailed quote, schedule a demo with the Cymulate team. (Source: manual)

What factors determine Cymulate's subscription cost?

The subscription cost is determined by the selected package, the number of assets covered, and the scenarios and simulations chosen for testing and validation. (Source: manual)

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating adherence to industry-leading security and privacy standards. Details here.

How does Cymulate ensure data security and privacy?

Cymulate uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), hosts data in secure AWS data centers, and follows a strict Secure Development Lifecycle (SDLC) with continuous vulnerability scanning and third-party penetration testing. (Source: https://cymulate.com/security-at-cymulate/)

Is Cymulate GDPR compliant?

Yes, Cymulate incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO), ensuring GDPR compliance. (Source: https://cymulate.com/security-at-cymulate/)

What product security features does Cymulate offer?

Cymulate's platform includes mandatory 2-Factor Authentication (2FA), Role-Based Access Controls (RBAC), IP address restrictions, and TLS encryption for its Help Center. (Source: https://cymulate.com/security-at-cymulate/)

Company & Industry Recognition

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity practices by enabling organizations to proactively validate their defenses, identify vulnerabilities, and optimize their security posture. The vision is to create a collaborative environment for lasting improvements in cybersecurity strategies. About Us

How is Cymulate recognized in the cybersecurity industry?

Cymulate is recognized as a market leader in automated security validation by Frost & Sullivan and was named a Customers' Choice in the 2025 Gartner Peer Insights. See details.

Where can I find Cymulate's customer reviews and ratings?

You can find verified customer reviews and ratings for Cymulate on the Reviews page and on Gartner Peer Insights. Cymulate is highly rated by security professionals worldwide.

How often is Cymulate's platform updated?

Cymulate updates its SaaS platform every two weeks with new features, such as AI-powered SIEM rule mapping and advanced exposure prioritization, ensuring customers have access to the latest capabilities. (Source: https://cymulate.com/about-us/)

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

US Cert Alert - Alert (AA23-025A) Protecting Against Malicious Use of Remote Monitoring and Management Software

January 26, 2023

Threat Actors Exploiting RMM Software

Using portable executables of RMM software provides a way for actors to establish local user access without the need for administrative privilege and full software installation—effectively bypassing common software controls and risk management assumptions.

CISA Analysis of Malicious Activity

In October 2022, CISA conducted a retrospective analysis using trusted third-party reporting and the EINSTEIN intrusion detection system (IDS) to identify suspected malicious activity on two federal civilian executive branch (FCEB) networks:

  • June 2022: A phishing email containing a phone number was sent to an FCEB employee’s government email address. The employee called the number, leading them to the malicious domain, myhelpcare[.]online.
  • September 2022: Bi-directional traffic was detected between an FCEB network and myhelpcare[.]cc.

Connection to Financially Motivated Phishing Campaign

Further analysis linked this activity to a widespread phishing campaign, including malicious typosquatting domains reported by Silent Push, impersonating well-known brands like Amazon, Microsoft, Geek Squad, McAfee, Norton, and PayPal.

Malicious Cyber Activity

The malicious campaign has been active since at least June 2022, targeting FCEB staff via help desk-themed phishing emails sent to both personal and government email addresses.

  • The emails contain either a link to a first-stage malicious domain or prompt recipients to call a number where cybercriminals convince them to visit the domain.
  • The recipient visiting the first-stage domain triggers the download of an executable, which then connects to a second-stage malicious domain to download additional RMM software.

Use of AnyDesk and ScreenConnect for Evasion

CISA noted that threat actors did not install the RMM clients on the compromised host. Instead, they downloaded AnyDesk and ScreenConnect as self-contained, portable executables configured to connect to the attacker’s RMM server.

Note: Portable executables do not require installation or administrative privileges, allowing them to:

  • Execute unapproved software even if security controls block standard installations.
  • Attack other vulnerable machines within the local intranet.
  • Establish long-term persistent access as a local user service.

Malicious Domains Used in the Campaign

CISA identified multiple first-stage malicious domain names that follow IT help/support-themed social engineering patterns, including:

  • hservice[.]live
  • gscare[.]live
  • nhelpcare[.]info
  • deskcareme[.]live
  • nhelpcare[.]cc

According to Silent Push, some of these domains impersonate brands such as Norton, GeekSupport, Geek Squad, Amazon, Microsoft, McAfee, and PayPal.

Additionally, first-stage malicious domains periodically redirect to other sites for further downloads of RMM software.

Use of Remote Monitoring and Management (RMM) Tools

After downloading the RMM software, threat actors used it for financial scams, particularly refund scams.

How the Refund Scam Works:

  1. The attacker connects to the victim’s system via RMM software.
  2. The victim is tricked into logging into their bank account while the attacker remains connected.
  3. The attacker modifies the bank account summary to show a false excess refund.
  4. The victim is then convinced to "refund" the excess amount—which is sent directly to the attacker.

Although this campaign is financially motivated, the access could enable further malicious activity, including attacks by advanced persistent threat (APT) groups.

Security Risks of RMM Tools in Cyber Attacks

Network defenders should be aware that:

  • Threat actors can abuse any legitimate RMM software, not just AnyDesk and ScreenConnect.
  • Portable RMM executables bypass software management controls and administrative privilege requirements.
  • Antivirus and antimalware defenses may not detect RMM software misuse.
  • RMM tools can serve as persistent backdoors for long-term access.
  • Attackers use RMM to avoid deploying custom malware, making detection harder.

Targeting Managed Service Providers (MSPs) and IT Help Desks

Threat actors frequently target MSPs and IT help desks, as these organizations regularly use RMM software for:

  • Remote IT support
  • Network management
  • Endpoint monitoring

A compromise of an MSP can lead to mass exploitation, affecting numerous downstream clients with threats like ransomware and cyber espionage.

Mitigation Measures

The authoring organizations strongly recommend that network defenders implement the mitigation strategies outlined in the Mitigations section of this Cybersecurity Advisory (CSA) to protect against the malicious use of legitimate RMM software.