A new social engineering campaign is abusing user trust and legitimate software to gain persistent access to victim systems. The attack uses a voicemail-themed lure to persuade targets to install a legitimate Remote Monitoring and Management (RMM) tool, Remotely RMM. Unlike attacks that exploit software vulnerabilities, this campaign's success hinges entirely on tricking the user into authorizing the installation. Once the RMM tool is installed, the attacker gains full administrative control over the compromised device, allowing for silent data exfiltration, surveillance, and deployment of additional malware. This tactic is effective because it uses signed, legitimate software that is often trusted by security products, allowing the attacker's activity to blend in with normal administrative traffic.
The campaign, tracked by security firm Censys, is a classic example of abusing legitimate tools, a technique often referred to as "Living off the Land." The attack flow is simple but effective:
Once the device is enrolled, the attacker has the same capabilities as a legitimate IT administrator, including file system access, remote shell, process management, and screen viewing.
The key to this attack is the abuse of Remotely RMM, an open-source RMM solution. The attackers host their own Remotely RMM server and configure the installer to automatically connect to it. Because Remotely RMM is a legitimate tool with a valid digital signature, it is less likely to be flagged as malicious by traditional antivirus software. The campaign has been observed using German-language lures, suggesting a focus on that region, but the technique can be easily adapted for any language or target.
This attack bypasses many technical defenses because it does not rely on an exploit. The user is the one who authorizes the software installation. The attacker's C2 traffic is also difficult to detect, as it is simply legitimate RMM protocol traffic going to the attacker's server.
T1566.002 - Phishing: Spearphishing Link: Use of a link in an email to direct the user to a malicious site.T1204.001 - User Execution: Malicious Link: Relies on the user clicking the link to initiate the attack.T1219 - Remote Access Software: The core of the attack is the installation of legitimate RMM software for malicious purposes.T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder: RMM software typically configures itself to run at startup to maintain persistence.A successful attack results in a complete and persistent compromise of the victim's workstation. The attacker can silently monitor user activity, steal sensitive files and credentials, and use the compromised machine as a beachhead to move laterally within the network. Because the C2 traffic appears as legitimate RMM activity, the compromise can go undetected for long periods. This type of access is highly valuable for both cybercriminals (for financial fraud or ransomware deployment) and espionage actors (for long-term intelligence gathering).
| Type | Value | Description |
|---|---|---|
process_name |
Remotely_Agent.exe |
The presence of the Remotely RMM agent process, if the tool is not officially used by the organization. |
url_pattern |
voicemail-online.net, message-service.com |
Monitor for traffic to domains themed around voicemail or messaging services that are not part of corporate infrastructure. |
network_traffic_pattern |
Outbound RMM traffic |
Monitor for outbound connections using common RMM ports (e.g., 5938, 8040) to unknown or untrusted IP addresses. |
D3-EAL: Executable Allowlisting.D3-OTF: Outbound Traffic Filtering.The primary defense is training users to recognize social engineering and not to install software from untrusted sources.
Use application control or allowlisting to prevent the execution of unauthorized software, including unapproved RMM tools.
Mapped D3FEND Techniques:
Remove local administrator rights from standard users to prevent them from installing software.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats