Security researchers have identified a novel attack vector where threat actors are abusing legitimate Microsoft Windows screensaver files (.scr) to deploy Remote Monitoring and Management (RMM) tools. This technique allows attackers to establish persistent, stealthy remote access to victim systems. By disguising their payload as a screensaver file, attackers can trick users into execution and bypass security controls that might otherwise block the installation of known RMM software. Once deployed, the legitimate RMM tool is used for malicious purposes, such as data exfiltration, surveillance, or lateral movement. This abuse of a native Windows feature is another example of a Living-off-the-Land (LotL) technique designed to blend in with normal system activity and evade detection.
.scr) files delivered via phishing or social engineering..scr file acts as a dropper for a malicious payload.This attack is effective because .scr files are executables, but they are often less scrutinized by users and some security tools than standard .exe files. The use of a legitimate, signed RMM tool as the final payload further complicates detection.
The attack chain is straightforward but clever:
Initial Access: The user receives the malicious .scr file, typically through a phishing email, a malicious download, or a social engineering scheme. The file may be named something innocuous like document.scr or report_viewer.scr to trick the user.
Execution: The user double-clicks the file, believing it to be a document or a screensaver. Since Windows treats .scr files as executables, this runs the embedded code (T1204.002).
Dropper Functionality: The .scr file contains a dropper, which is a small program designed to install another payload. The dropper extracts the RMM installer from its resources and executes it silently in the background.
RMM Installation: The legitimate RMM software (e.g., ScreenConnect) is installed on the system. The installer may be pre-configured to automatically connect back to the attacker's RMM server, granting them immediate remote access.
Persistence: The RMM tool itself provides persistence. It installs as a service that runs automatically at system startup, ensuring the attacker maintains access even after a reboot (T1543.003).
This is a classic example of abusing dual-use tools. The attacker leverages the functionality of a legitimate IT administration tool for malicious command and control (T1219).
.scr files from suspicious locations like email attachments or download folders. An EDR solution can alert on a .scr process spawning an installer or making network connections..scr files. Since they are rarely used for legitimate business purposes, blocking them carries low operational risk.invoice.pdf.scr.Use application control to prevent the execution of unauthorized RMM tools and .scr files.
Configure email and web gateways to block executable file types, including .scr, from being downloaded.
Train users to recognize and report suspicious attachments and to be wary of files with double extensions.
Configure Windows Explorer to always show file extensions to prevent users from being tricked by files named like 'document.pdf.scr'.
The most effective defense against this attack vector is to implement application allowlisting. Since the attack relies on executing an unauthorized screensaver file and then an unapproved RMM tool, a properly configured allowlist would block the attack at two different stages. First, the malicious .scr file itself would be blocked from running. Second, even if the dropper succeeded, the RMM installer would be blocked. Organizations should create a policy that only allows approved applications to run. For RMM tools, only the specific solution used by the IT department should be on the allowlist, and all others (like ScreenConnect, if not in use) should be explicitly denied. This prevents attackers from abusing a wide range of dual-use tools.
Security teams should use EDR to create detection rules based on the process chain of this attack. A high-fidelity alert can be generated by looking for a screensaver process (any process ending in .scr) that spawns a child process associated with a software installer (e.g., msiexec.exe) or that makes an outbound network connection. Legitimate screensavers do not typically install software or phone home to the internet. Monitoring for this specific, anomalous behavior provides a reliable way to detect the attack in progress, allowing for rapid response before the attacker can establish persistent RMM access.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats