Security researchers have uncovered a sophisticated campaign by the 'Crazy' ransomware gang that leverages legitimate, commercially available software to evade detection and maintain persistence. This 'living off the land' (LotL) approach involves the abuse of the 'Net Monitor for Employees Professional' employee monitoring tool and the 'SimpleHelp' remote support application. By using these trusted tools, the Crazy threat actors can blend their command-and-control (C2) traffic with legitimate administrative activity, making them exceptionally difficult to detect with traditional security measures. This TTP (Tactic, Technique, and Procedure) allows the attackers to achieve long-term persistence, disable security controls, and carefully prepare their environment before deploying the final ransomware payload.
The attack chain demonstrates a calculated effort to remain hidden. The threat actors gain initial access through an unspecified vector, likely a compromised VPN or a phishing email. Once inside, they use PowerShell to deploy their toolset.
This campaign is a prime example of threat actors abusing dual-use tools to minimize their footprint and evade EDR and antivirus solutions.
T1219 - Remote Access Software: The core of the attack. By using legitimate tools like SimpleHelp, the attackers' C2 traffic appears as normal remote support activity, which is often allow-listed in firewall and proxy configurations.T1059.001 - PowerShell: Used for the initial installation and configuration of the malicious tools. PowerShell is a powerful, trusted scripting language, making its abuse common for defense evasion.T1036.005 - Match Legitimate Name or Location: The tactic of naming the SimpleHelp executable after a OneDrive component is a direct attempt to hide in plain sight.T1562.001 - Disable or Modify Tools: The attempt to disable Windows Defender is a standard step for ransomware operators to ensure their payload can execute without being blocked.This abuse of legitimate software is a growing challenge for defenders. It shifts the focus from detecting overtly malicious files to identifying malicious use of legitimate tools.
The use of this stealthy TTP increases the potential dwell time of attackers, allowing them to conduct more thorough reconnaissance and inflict greater damage. The business impact includes:
7045 can be used for this purpose.Use application control solutions like AppLocker to prevent the execution of unauthorized remote access and monitoring software.
Mapped D3FEND Techniques:
Implement strict egress filtering to block C2 communications from unauthorized remote access tools.
Mapped D3FEND Techniques:
To counter the 'Crazy' ransomware gang's abuse of legitimate software, the most effective defense is Executable Allowlisting, often implemented via technologies like Windows AppLocker. Security teams should create a 'golden image' or baseline of all approved applications and executables required for business operations. This allowlist should then be enforced across all endpoints, particularly servers. In this configuration, any attempt to run an unauthorized executable, such as 'Net Monitor for Employees' or a disguised 'SimpleHelp.exe', would be blocked by default. This preventative control is highly effective against this TTP because it doesn't rely on detecting 'badness'; instead, it enforces 'goodness' by only permitting known, trusted software to run. While it requires an initial investment to build and maintain the allowlist, it is one of the strongest possible defenses against malware and the abuse of dual-use tools.
For organizations where strict allowlisting is not feasible, enhanced Process Analysis via an EDR tool is essential. Security teams must configure their EDR to monitor for suspicious process relationships and command-line arguments. For this specific threat, rules should be created to alert on: 1) PowerShell processes downloading executables from the internet. 2) The installation of new services by non-standard administrator accounts. 3) Processes associated with legitimate software (like OneDrive) spawning unusual child processes. 4) Any process attempting to tamper with or disable security tools like Windows Defender. By analyzing the context and behavior of processes, rather than just their names or hashes, security teams can identify when a legitimate tool is being used for malicious purposes, which is the core of this attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats