'Skeleton Key' Attacks Bypass Defenses by Weaponizing Legitimate RMM Tools

New 'Skeleton Key' Campaign Abuses Legitimate RMM Software for Stealthy Backdoor Access

HIGH
January 22, 2026
5m read
Threat IntelligenceSecurity OperationsCyberattack

Related Entities

Organizations

Products & Tech

Remote Monitoring and Management (RMM)

Full Report

Executive Summary

A report from KnowBe4 Threat Labs has detailed an advanced attack campaign named "Skeleton Key," which exemplifies a significant shift in threat actor tactics towards 'living-off-the-land' (LotL). Instead of using custom malware, these attackers are abusing legitimate, trusted Remote Monitoring and Management (RMM) software to establish persistent backdoor access into enterprise networks. The campaign involves a dual-vector approach: first compromising credentials, then repurposing already-installed or newly-deployed RMM tools as a covert command-and-control channel. This method allows attackers to evade traditional antivirus and EDR solutions that are primarily focused on detecting malicious files, posing a major challenge for security operations centers (SOCs) and demanding a new focus on identity and behavioral monitoring.


Threat Overview

The "Skeleton Key" campaign is not about brute-forcing entry but about stealth and mimicry. The attackers' methodology is as follows:

  1. Initial Compromise: The campaign begins by obtaining valid credentials, likely through phishing, password spraying, or purchasing them from dark web marketplaces. This leverages the MITRE ATT&CK technique T1078 - Valid Accounts.
  2. Abuse of Trusted Software: With valid credentials, the attackers log into the network and deploy or reconfigure existing RMM software. This abuse of T1219 - Remote Access Software turns a legitimate IT administration tool into a persistent backdoor.
  3. Defense Evasion: Because RMM tools are trusted and often allowlisted in security products, their traffic and activities do not trigger typical malware alerts. The attackers' actions blend in with the noise of legitimate administrative tasks, making them incredibly difficult to detect.

This LotL approach is effective because it exploits the trust that organizations place in their own IT tools.

Technical Analysis

The core of the technique is the abuse of the implicit trust given to RMM agents. These agents are designed to provide deep system access, execute commands, transfer files, and manage system processes—all the capabilities an attacker needs. By using a legitimate, signed RMM agent, attackers bypass application whitelisting, code signing checks, and signature-based detection. Their command-and-control (C2) traffic is routed through the RMM vendor's legitimate cloud infrastructure, making it difficult to block at the network perimeter. The attackers effectively inherit the permissions and trust of the RMM tool, gaining a 'skeleton key' to the victim's network.

Impact Assessment

  • Persistent, Undetected Access: The primary impact is the establishment of a long-term, stealthy foothold in the network, which can be used for data exfiltration, lateral movement, or deploying secondary payloads like ransomware.
  • Bypass of Security Controls: The campaign renders many traditional, signature-based security controls ineffective, forcing a costly re-evaluation of security strategy.
  • Increased Detection Complexity: SOC analysts must now differentiate between malicious and legitimate use of the same tools, a significantly more complex task than identifying known-bad malware. This leads to analyst fatigue and a higher chance of missing real threats.

Detection & Response

Defending against this requires a shift from signature-based to behavior-based detection:

  1. Monitor RMM Usage: Implement strict auditing and monitoring for all RMM tools. This aligns with D3FEND's Resource Access Pattern Analysis. Create alerts for:
    • New, unauthorized deployments of RMM software.
    • RMM connections originating from unusual IP addresses or geographic locations.
    • Administrative activity occurring outside of normal business hours.
  2. Identity and Access Monitoring: Closely monitor account usage. Look for logins with impossible travel scenarios, multiple failed login attempts followed by a success, or a user account suddenly using administrative tools it has never used before. This is an application of User Geolocation Logon Pattern Analysis.
  3. Endpoint Baselining: Establish a baseline of normal software and processes running on endpoints. Use EDR tools to alert on deviations, such as the installation of a new RMM agent on a server that shouldn't have one.

Mitigation

  1. Principle of Least Privilege: Strictly control who can install and use RMM software. Not every IT staff member needs RMM access to every machine. This is part of M1026 - Privileged Account Management.
  2. Application Control: Where possible, use application control or allowlisting (M1038 - Execution Prevention) to define exactly which RMM tools are permitted in the environment and block all others.
  3. Multi-Factor Authentication (MFA): Enforce MFA on all remote access, including logins to RMM consoles. This is the most effective way to prevent the initial credential compromise that enables this attack. (M1032 - Multi-factor Authentication).
  4. Vendor Security: Vet the security practices of your RMM vendor. Ensure they provide robust logging, role-based access control, and security features for their platform.

Timeline of Events

1
January 22, 2026
KnowBe4 Threat Labs publishes a report on the 'Skeleton Key' campaign.
2
January 22, 2026
This article was published

MITRE ATT&CK Mitigations

Use EDR and behavioral analytics to detect anomalous use of legitimate software, rather than relying on signatures.

Mapped D3FEND Techniques:

Implement application allowlisting to prevent the execution of unauthorized RMM tools.

Mapped D3FEND Techniques:

Strictly control and monitor the use of administrative accounts and tools, enforcing the principle of least privilege.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter the 'Skeleton Key' campaign's abuse of RMM tools, security teams must shift to analyzing behavior patterns. Ingest logs from all sanctioned RMM platforms (e.g., ConnectWise, AnyDesk, TeamViewer) into a SIEM. Establish a baseline of normal activity for each administrative user: what systems do they typically access, from what IP ranges, and during what hours? Create alerts for deviations, such as an IT admin from the US suddenly logging into a server from an Eastern European IP, or a helpdesk account that normally only accesses workstations suddenly connecting to a domain controller via RMM. This behavioral approach is crucial for distinguishing malicious use of a legitimate tool from benign administrative work.

A powerful defense against unauthorized RMM software is executable allowlisting. Security teams should define a 'golden image' or a strict list of approved applications for different classes of assets (e.g., workstations, domain controllers, web servers). By configuring application control solutions (like AppLocker) to only permit sanctioned RMM tools, organizations can prevent attackers from introducing their preferred RMM software into the environment, even if they have credentials. This forces attackers to use only the tools already present, narrowing the scope of what security teams need to monitor and making anomalous activity within those sanctioned tools easier to spot.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Living off the LandLOTLRMMThreat ActorDefense EvasionPersistence

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading