A report from KnowBe4 Threat Labs has detailed an advanced attack campaign named "Skeleton Key," which exemplifies a significant shift in threat actor tactics towards 'living-off-the-land' (LotL). Instead of using custom malware, these attackers are abusing legitimate, trusted Remote Monitoring and Management (RMM) software to establish persistent backdoor access into enterprise networks. The campaign involves a dual-vector approach: first compromising credentials, then repurposing already-installed or newly-deployed RMM tools as a covert command-and-control channel. This method allows attackers to evade traditional antivirus and EDR solutions that are primarily focused on detecting malicious files, posing a major challenge for security operations centers (SOCs) and demanding a new focus on identity and behavioral monitoring.
The "Skeleton Key" campaign is not about brute-forcing entry but about stealth and mimicry. The attackers' methodology is as follows:
T1078 - Valid Accounts.T1219 - Remote Access Software turns a legitimate IT administration tool into a persistent backdoor.This LotL approach is effective because it exploits the trust that organizations place in their own IT tools.
The core of the technique is the abuse of the implicit trust given to RMM agents. These agents are designed to provide deep system access, execute commands, transfer files, and manage system processes—all the capabilities an attacker needs. By using a legitimate, signed RMM agent, attackers bypass application whitelisting, code signing checks, and signature-based detection. Their command-and-control (C2) traffic is routed through the RMM vendor's legitimate cloud infrastructure, making it difficult to block at the network perimeter. The attackers effectively inherit the permissions and trust of the RMM tool, gaining a 'skeleton key' to the victim's network.
Defending against this requires a shift from signature-based to behavior-based detection:
Resource Access Pattern Analysis. Create alerts for:User Geolocation Logon Pattern Analysis.M1026 - Privileged Account Management.M1038 - Execution Prevention) to define exactly which RMM tools are permitted in the environment and block all others.M1032 - Multi-factor Authentication).Use EDR and behavioral analytics to detect anomalous use of legitimate software, rather than relying on signatures.
Mapped D3FEND Techniques:
Implement application allowlisting to prevent the execution of unauthorized RMM tools.
Mapped D3FEND Techniques:
Strictly control and monitor the use of administrative accounts and tools, enforcing the principle of least privilege.
Mapped D3FEND Techniques:
To counter the 'Skeleton Key' campaign's abuse of RMM tools, security teams must shift to analyzing behavior patterns. Ingest logs from all sanctioned RMM platforms (e.g., ConnectWise, AnyDesk, TeamViewer) into a SIEM. Establish a baseline of normal activity for each administrative user: what systems do they typically access, from what IP ranges, and during what hours? Create alerts for deviations, such as an IT admin from the US suddenly logging into a server from an Eastern European IP, or a helpdesk account that normally only accesses workstations suddenly connecting to a domain controller via RMM. This behavioral approach is crucial for distinguishing malicious use of a legitimate tool from benign administrative work.
A powerful defense against unauthorized RMM software is executable allowlisting. Security teams should define a 'golden image' or a strict list of approved applications for different classes of assets (e.g., workstations, domain controllers, web servers). By configuring application control solutions (like AppLocker) to only permit sanctioned RMM tools, organizations can prevent attackers from introducing their preferred RMM software into the environment, even if they have credentials. This forces attackers to use only the tools already present, narrowing the scope of what security teams need to monitor and making anomalous activity within those sanctioned tools easier to spot.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats