'Crazy' Ransomware Gang Abuses Legitimate Employee Monitoring Software for Stealthy Persistence

Ransomware Operators Abuse 'Net Monitor for Employees' and 'SimpleHelp' for Covert Access

HIGH
February 14, 2026
5m read
RansomwareMalwareThreat Actor

Related Entities

Threat Actors

Crazy

Products & Tech

Net Monitor for Employees ProfessionalSimpleHelpPowerShell Microsoft OneDrive

Full Report

Executive Summary

Security researchers have uncovered a sophisticated campaign by the 'Crazy' ransomware gang that leverages legitimate, commercially available software to evade detection and maintain persistence. This 'living off the land' (LotL) approach involves the abuse of the 'Net Monitor for Employees Professional' employee monitoring tool and the 'SimpleHelp' remote support application. By using these trusted tools, the Crazy threat actors can blend their command-and-control (C2) traffic with legitimate administrative activity, making them exceptionally difficult to detect with traditional security measures. This TTP (Tactic, Technique, and Procedure) allows the attackers to achieve long-term persistence, disable security controls, and carefully prepare their environment before deploying the final ransomware payload.


Threat Overview

The attack chain demonstrates a calculated effort to remain hidden. The threat actors gain initial access through an unspecified vector, likely a compromised VPN or a phishing email. Once inside, they use PowerShell to deploy their toolset.

  1. Deployment of Remote Access Tools: The attackers install both 'Net Monitor for Employees Professional' and 'SimpleHelp'. Using two different tools provides redundancy, ensuring they maintain access even if one is discovered and removed.
  2. Masquerading: To avoid suspicion, the SimpleHelp application is installed with filenames that mimic legitimate, trusted software, such as components of Microsoft OneDrive. This is a classic masquerading technique designed to fool system administrators and automated security checks.
  3. Defense Evasion: Once persistent access is established, the attackers attempt to disable endpoint security products like Windows Defender to operate freely within the network.
  4. Reconnaissance and Staging: The attackers use their covert access to explore the network, identify high-value targets, and monitor for activity such as access to cryptocurrency wallets, indicating an intent to steal financial assets in addition to deploying ransomware.
  5. Ransomware Deployment: After thorough preparation, the 'Crazy' ransomware payload is deployed across the network.

Technical Analysis

This campaign is a prime example of threat actors abusing dual-use tools to minimize their footprint and evade EDR and antivirus solutions.

  • T1219 - Remote Access Software: The core of the attack. By using legitimate tools like SimpleHelp, the attackers' C2 traffic appears as normal remote support activity, which is often allow-listed in firewall and proxy configurations.
  • T1059.001 - PowerShell: Used for the initial installation and configuration of the malicious tools. PowerShell is a powerful, trusted scripting language, making its abuse common for defense evasion.
  • T1036.005 - Match Legitimate Name or Location: The tactic of naming the SimpleHelp executable after a OneDrive component is a direct attempt to hide in plain sight.
  • T1562.001 - Disable or Modify Tools: The attempt to disable Windows Defender is a standard step for ransomware operators to ensure their payload can execute without being blocked.

This abuse of legitimate software is a growing challenge for defenders. It shifts the focus from detecting overtly malicious files to identifying malicious use of legitimate tools.

Impact Assessment

The use of this stealthy TTP increases the potential dwell time of attackers, allowing them to conduct more thorough reconnaissance and inflict greater damage. The business impact includes:

  • Higher Ransom Demands: With more time to understand the victim's network and identify critical data, attackers can set higher and more targeted ransom demands.
  • Complete Data Exfiltration: Long dwell times increase the likelihood that attackers can exfiltrate large volumes of sensitive data before deploying ransomware, enabling double extortion.
  • Difficult Remediation: The use of multiple, persistent backdoors makes incident response and cleanup more complex.

Detection & Response

  • Application Allowlisting: Implement a strict application allowlisting policy. This would prevent the unauthorized installation of tools like 'Net Monitor for Employees' or 'SimpleHelp' if they are not approved for corporate use.
  • Monitor for New Service Installations: Monitor for the creation of new services, especially those associated with remote access tools. Windows Event ID 7045 can be used for this purpose.
  • Egress Traffic Filtering: Strictly control outbound network traffic. Connections to the C2 infrastructure for tools like SimpleHelp may go to known cloud providers but on non-standard ports or to unusual hostnames. Deny all outbound traffic by default and only allow what is necessary.
  • PowerShell Logging: Enable enhanced PowerShell script block and module logging. This will provide visibility into the commands used to download and install the malicious tools.

Mitigation

  1. Restrict Software Installation: Prevent standard users from installing software. Use application control solutions like AppLocker to enforce this.
  2. Harden Remote Access: Secure all remote access points, particularly VPNs, with strong passwords and mandatory multi-factor authentication (MFA).
  3. Principle of Least Privilege: Ensure that user and service accounts have only the minimum permissions necessary to perform their roles.
  4. Regularly Audit Installed Software: Conduct regular audits of installed software on all endpoints to identify unauthorized or suspicious applications.

Timeline of Events

1
February 14, 2026
This article was published

MITRE ATT&CK Mitigations

Use application control solutions like AppLocker to prevent the execution of unauthorized remote access and monitoring software.

Mapped D3FEND Techniques:

Implement strict egress filtering to block C2 communications from unauthorized remote access tools.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Enable enhanced logging for PowerShell and process creation to detect the installation and execution of suspicious tools.

D3FEND Defensive Countermeasures

To counter the 'Crazy' ransomware gang's abuse of legitimate software, the most effective defense is Executable Allowlisting, often implemented via technologies like Windows AppLocker. Security teams should create a 'golden image' or baseline of all approved applications and executables required for business operations. This allowlist should then be enforced across all endpoints, particularly servers. In this configuration, any attempt to run an unauthorized executable, such as 'Net Monitor for Employees' or a disguised 'SimpleHelp.exe', would be blocked by default. This preventative control is highly effective against this TTP because it doesn't rely on detecting 'badness'; instead, it enforces 'goodness' by only permitting known, trusted software to run. While it requires an initial investment to build and maintain the allowlist, it is one of the strongest possible defenses against malware and the abuse of dual-use tools.

For organizations where strict allowlisting is not feasible, enhanced Process Analysis via an EDR tool is essential. Security teams must configure their EDR to monitor for suspicious process relationships and command-line arguments. For this specific threat, rules should be created to alert on: 1) PowerShell processes downloading executables from the internet. 2) The installation of new services by non-standard administrator accounts. 3) Processes associated with legitimate software (like OneDrive) spawning unusual child processes. 4) Any process attempting to tamper with or disable security tools like Windows Defender. By analyzing the context and behavior of processes, rather than just their names or hashes, security teams can identify when a legitimate tool is being used for malicious purposes, which is the core of this attack.

Sources & References

Cyber News Roundup – February 13th 2026
Integrity360 (integrity360.com) February 13, 2026
Top 5 Cybersecurity News Stories February 13, 2026
Diesec (diesec.com) February 13, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareLiving off the LandTTPPersistenceRemote Access SoftwareDefense Evasion

📢 Share This Article

Help others stay informed about cybersecurity threats