{"id":20522,"date":"2026-04-28T12:01:34","date_gmt":"2026-04-28T12:01:34","guid":{"rendered":"https:\/\/any.run\/cybersecurity-blog\/?p=20522"},"modified":"2026-04-28T12:21:02","modified_gmt":"2026-04-28T12:21:02","slug":"rmm-blind-spot-for-cisos","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/","title":{"rendered":"Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can\u2019t Ignore\u00a0"},"content":{"rendered":"\n<p>CISOs are under pressure to prove that their security programs can detect threats early, reduce business risk, and support fast, confident response. But that becomes harder when attackers stop relying on obviously malicious tools.<\/p>\n\n\n\n<p>In recent phishing-to-RMM campaigns observed by <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> analysts, threat actors are using fake Microsoft, Adobe, and OneDrive pages to deliver legitimate remote management tools instead of traditional malware. Once installed, these tools can give attackers remote access to a victim\u2019s device while blending into software categories many enterprises already use or allow.<\/p>\n\n\n\n<p>For security leaders, this creates a difficult visibility problem. The payload may be legitimate. The infrastructure may be trusted. The user action may look like a routine download. Yet the outcome is the same: unauthorized remote access inside the environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key&nbsp;Takeaways&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing-to-RMM attacks create a dangerous visibility gap for enterprise SOCs: <\/strong>Attackers can deliver legitimate remote management tools through phishing pages that impersonate trusted services like Microsoft, Adobe, and OneDrive.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The payload may not look malicious on its own: <\/strong>Tools such as ScreenConnect and LogMeIn Rescue can appear as legitimate remote administration software, especially in organizations where RMM usage is already allowed.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Domain reputation is not enough: <\/strong>These attacks may use legitimate platforms, vendor infrastructure, or compromised websites instead of obvious newly registered domains.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The real signal is in the full attack chain: <\/strong>SOC teams need to connect the phishing lure, download context, execution behavior, RMM installation, and outbound connections.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>For CISOs, the risk is operational as much as technical: <\/strong>Missed phishing-to-RMM activity can lead to slower detection, longer attacker dwell time, delayed containment, and weaker confidence in approved remote access tools.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ANY.RUN helps turn gray-zone activity into evidence: <\/strong>With <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a> and <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence<\/a>, teams can safely analyze suspicious URLs and files, trace RMM behavior, and investigate related phishing-to-RMM chains.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The Blind Spot: When \u201cAllowed\u201d Tools Become the Attack Path<\/h2>\n\n\n\n<p>Most enterprise security programs are built to separate malicious activity from normal operations. Phishing-to-RMM attacks blur that line.<\/p>\n\n\n\n<p>An RMM installer can pass basic checks because it is not malware by design. But the risk is not in the tool alone. It is in the context around it: how it reached the user, whether the download was expected, which endpoint launched it, and what connection followed.<\/p>\n\n\n\n<p>For CISOs, this is where the risk becomes critical. Unauthorized access can hide inside routine-looking activity, giving the business a false sense of control while the attacker is already inside.<\/p>\n\n\n\n<p>The&nbsp;outcome&nbsp;can&nbsp;be&nbsp;serious:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Slower\u00a0detection<\/strong>\u00a0because\u00a0the\u00a0activity\u00a0does\u00a0not\u00a0look\u00a0like\u00a0classic\u00a0malware\u00a0<\/li>\n\n\n\n<li><strong>Longer\u00a0attacker\u00a0dwell\u00a0time<\/strong>\u00a0inside\u00a0the\u00a0environment\u00a0<\/li>\n\n\n\n<li><strong>Higher\u00a0risk\u00a0of\u00a0lateral\u00a0movement\u00a0<\/strong>from\u00a0the\u00a0compromised\u00a0endpoint\u00a0<\/li>\n\n\n\n<li><strong>More\u00a0pressure<\/strong>\u00a0on\u00a0SOC\u00a0teams\u00a0to\u00a0investigate\u00a0ambiguous\u00a0alerts\u00a0<\/li>\n\n\n\n<li><strong>Delayed\u00a0containment<\/strong>\u00a0because\u00a0the\u00a0initial\u00a0access\u00a0path\u00a0is\u00a0harder\u00a0to\u00a0prove\u00a0<\/li>\n\n\n\n<li><strong>Weaker\u00a0confidence<\/strong>\u00a0in\u00a0whether\u00a0approved\u00a0remote\u00a0access\u00a0tools\u00a0are\u00a0being\u00a0used\u00a0safely\u00a0<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nClose the gap before it becomes business risk. <br>\n<span class=\"highlight\">Give your SOC full visibility into suspicious activity.<br><\/span><\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=rmm-blind-spot &#038;utm_term=280426&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nContact us\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Which&nbsp;Organizations&nbsp;are&nbsp;Most&nbsp;Exposed&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN data shows that phishing-to-RMM activity is primarily concentrated in the <strong>United States<\/strong>, followed by <strong>Canada, Europe, and Australia<\/strong>. The most affected industries include Education, Technology, Banking, Government, Manufacturing, and Finance.<\/p>\n\n\n\n<p>These sectors often depend on remote administration for IT support, distributed workforce management, and endpoint maintenance. That reliance creates more room for abuse: when RMM tools are already part of normal operations, unauthorized access can take longer to recognize and contain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How&nbsp;Legitimate&nbsp;RMM Tools&nbsp;Are&nbsp;Delivered&nbsp;Through&nbsp;Phishing&nbsp;<\/h2>\n\n\n\n<p>Since&nbsp;early April, the ANY.RUN team has&nbsp;observed&nbsp;a rise in phishing-to-RMM attacks, where threat actors use phishing to deliver legitimate remote management tools and gain remote access to victims\u2019 devices.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For just one of these campaigns, we are seeing more than 50 public analyses in ANY.RUN every week: <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookup#{%22query%22:%22suricataID:%5C%2284002229%5C%22%22,%22dateRange%22:7}\" target=\"_blank\" rel=\"noreferrer noopener\">suricataID:&#8221;84002229&#8243;<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"553\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/imageb-1-1024x553.png\" alt=\"Public analyses related to\u00a0phishing-to-RMM attacks\u00a0demonstrated\u00a0inside ANY.RUN\u2019s TI Lookup\" class=\"wp-image-20549\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/imageb-1-1024x553.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/imageb-1-300x162.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/imageb-1-768x415.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/imageb-1-1536x829.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/imageb-1-2048x1106.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/imageb-1-370x200.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/imageb-1-270x146.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/imageb-1-740x400.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Public analyses related to&nbsp;phishing-to-RMM attacks&nbsp;demonstrated&nbsp;inside ANY.RUN\u2019s TI Lookup<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Phishing campaigns that deliver RMM tools are especially dangerous for SOC teams because these tools can appear to be legitimate remote administration software. If an organization already uses or allows RMM solutions, the launch of <strong>ScreenConnect<\/strong> may not immediately trigger security policies.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nClose the RMM abuse gap in your SOC. <br>\n<span class=\"highlight\">Integrate ANY.RUN\u2019s threat analysis and intelligence.<br><\/span><\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=rmm-blind-spot &#038;utm_term=280426&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nContact us\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>The screenshot below shows a phishing page impersonating <strong>Microsoft Store<\/strong> and <strong>Adobe Acrobat Reader DC<\/strong>. The user is prompted to download <strong>Adobesetup.exe<\/strong>, but behind that name is ScreenConnect; an RMM tool that attackers can use to establish remote access to the system.<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/e072ae4e-214c-4039-957d-7c0cbe682da8\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View&nbsp;analysis&nbsp;session<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"568\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image9-3-1024x568.png\" alt=\"A\u00a0fake\u00a0Microsoft Store\u00a0page\u00a0with\u00a0an\u00a0RMM\u00a0installer\u00a0disguised\u00a0as\u00a0Adobe\u00a0\" class=\"wp-image-20553\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image9-3-1024x568.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image9-3-300x167.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image9-3-768x426.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image9-3-1536x853.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image9-3-2048x1137.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image9-3-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image9-3-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image9-3-740x411.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>A&nbsp;fake&nbsp;Microsoft Store&nbsp;page&nbsp;with&nbsp;an&nbsp;RMM&nbsp;installer&nbsp;disguised&nbsp;as&nbsp;Adobe<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Another example shows the attack disguised as a protected Microsoft OneDrive download. The page at vmail.app.n8n.cloud displays a <strong>\u201cVerify to Download\u201d <\/strong>prompt for what appears to be a PDF document. Once the user clicks, they receive ScreenConnect.ClientSetup.exe:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.12.32-1024x578.png\" alt=\"\" class=\"wp-image-20555\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.12.32-1024x578.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.12.32-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.12.32-768x433.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.12.32-1536x867.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.12.32-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.12.32-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.12.32-740x417.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.12.32.png 1918w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Fake Microsoft&nbsp;OneDrive page&nbsp;with&nbsp;an&nbsp;RMM installer disguised as a PDF document<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>This chain makes SOC triage more difficult: the phishing landing page is hosted on the legitimate n8n.cloud platform, while the RMM agent download and subsequent connection occur through legitimate <strong>ScreenConnect infrastructure.<\/strong><\/p>\n\n\n\n<p>The attack does not rely on obvious newly registered domains, which are often an easy signal for blocking. As a result, detection needs to be based on behavior, download context, and anomalies around RMM execution, not domain reputation alone.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"126\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image3-4-1024x126.png\" alt=\"Traffic to\u00a0ScreenConnect\u00a0in ANY.RUN\u2019s Connections tab\u00a0\" class=\"wp-image-20557\" style=\"width:640px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image3-4-1024x126.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image3-4-300x37.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image3-4-768x95.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image3-4-1536x189.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image3-4-370x46.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image3-4-270x33.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image3-4-740x91.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image3-4.png 1786w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Traffic to&nbsp;ScreenConnect&nbsp;in ANY.RUN\u2019s Connections tab<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>In addition to ScreenConnect, threat actors use other <strong>legitimate RMM and remote-access tools<\/strong> in these phishing chains, including Datto RMM, ITarian, LogMeIn Rescue, Action1 RMM, NetSupport, Syncro, MeshAgent, SimpleHelp, RustDesk, and Splashtop.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"360\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image4-3-1024x360.png\" alt=\"TI\u00a0Lookup\u00a0query\u00a0for\u00a0tracking\u00a0phishing-to-RMM\u00a0attack\u00a0chains\u00a0\" class=\"wp-image-20558\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image4-3-1024x360.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image4-3-300x106.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image4-3-768x270.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image4-3-1536x540.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image4-3-2048x721.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image4-3-370x130.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image4-3-270x95.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image4-3-740x260.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI&nbsp;Lookup&nbsp;query&nbsp;for&nbsp;tracking&nbsp;phishing-to-RMM&nbsp;attack&nbsp;chains<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>To retrospectively track similar chains in&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN Threat Intelligence<\/a>, teams can use the following query.&nbsp;As part of TI Lookup, every user has&nbsp;access to 20 full queries:&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookup#{%22query%22:%22threatName:%5C%22^phishing$%5C%22%20and%20threatName:%5C%22rmm-tool%5C%22%22,%22dateRange%22:180}\" target=\"_blank\" rel=\"noreferrer noopener\">threatName:&#8221;^phishing$&#8221; and&nbsp;threatName:&#8221;rmm-tool&#8221;<\/a>&nbsp;<\/p>\n\n\n\n<p>In addition to standard installers,&nbsp;threat&nbsp;actors are also using more sophisticated delivery methods, as shown in&nbsp;this public analysis:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"548\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.26.24-1024x548.png\" alt=\"VBS\u00a0document\u00a0disguised\u00a0as\u00a0an\u00a0Adobe Acrobat\u00a0installer\" class=\"wp-image-20571\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.26.24-1024x548.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.26.24-300x160.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.26.24-768x411.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.26.24-1536x821.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.26.24-370x198.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.26.24-270x144.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.26.24-740x396.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-28-at-13.26.24.png 1608w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>VBS&nbsp;document&nbsp;disguised&nbsp;as&nbsp;an&nbsp;Adobe Acrobat&nbsp;installer<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>In&nbsp;this&nbsp;example,&nbsp;the&nbsp;user&nbsp;is&nbsp;shown&nbsp;a&nbsp;phishing&nbsp;page&nbsp;with&nbsp;an&nbsp;Adobe&nbsp;document&nbsp;download&nbsp;lure.&nbsp;Instead&nbsp;of&nbsp;the&nbsp;expected&nbsp;file,&nbsp;the&nbsp;page&nbsp;delivers&nbsp;a&nbsp;<strong>VBS&nbsp;script<\/strong>.&nbsp;<\/p>\n\n\n\n<p>Once executed, the script attempts to elevate privileges through UAC, disable SmartScreen, and weaken <strong>Microsoft Defender<\/strong> protections. It then silently downloads the <strong>LogMeIn Rescue<\/strong> installer, removes the Mark-of-the-Web, and runs a quiet installation via msiexec, turning the endpoint into a system with unattended RMM access.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nDetect trusted-tool abuse before attackers gain access. <br>\nBring ANY.RUN into your SOC for <span class=\"highlight\"> faster threat response. <br><\/span><\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=rmm-blind-spot &#038;utm_term=280426&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nIntegrate in your SOC\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>It is also worth noting that in campaigns like this, threat actors try to minimize easily blocked, lower-level IoCs from the <strong>Pyramid of Pain<\/strong>, such as newly registered domains.<\/p>\n\n\n\n<p>Instead, phishing pages may be hosted on already existing websites. The domain itself appears legitimate, while the suspicious activity is hidden deeper in the URL \u2014 in an unusual URI path that may indicate SEO injection or a compromised website.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"443\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_2-1024x443.png\" alt=\"\" class=\"wp-image-20567\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_2-1024x443.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_2-300x130.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_2-768x332.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_2-1536x664.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_2-2048x886.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_2-370x160.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_2-270x117.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_2-740x320.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>SEO&nbsp;injection&nbsp;into&nbsp;a&nbsp;legitimate&nbsp;domain&nbsp;in&nbsp;a&nbsp;phishing-to-RMM&nbsp;attack&nbsp;chain&nbsp;<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>At&nbsp;the&nbsp;time&nbsp;of&nbsp;analysis,&nbsp;VirusTotal&nbsp;showed&nbsp;that&nbsp;no&nbsp;vendor&nbsp;had&nbsp;flagged&nbsp;this&nbsp;domain&nbsp;as&nbsp;malicious:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"500\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_1-1024x500.png\" alt=\"VirusTotal\u00a0did\u00a0not\u00a0flag\u00a0the\u00a0domain\u00a0as\u00a0malicious\u00a0at\u00a0the\u00a0time\u00a0of\u00a0analysis\u00a0\" class=\"wp-image-20566\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_1-1024x500.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_1-300x147.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_1-768x375.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_1-1536x750.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_1-2048x1000.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_1-370x181.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_1-270x132.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/Screen_1-740x361.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>VirusTotal&nbsp;did&nbsp;not&nbsp;flag&nbsp;the&nbsp;domain&nbsp;as&nbsp;malicious&nbsp;at&nbsp;the&nbsp;time&nbsp;of&nbsp;analysis<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Taken together, these cases reflect a broader shift from <strong>malware-first initial access<\/strong> to <strong>phishing-first initial access<\/strong>. Threat actors are increasingly gaining access not through an obviously malicious payload, but through social engineering and legitimate remote administration tools.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How&nbsp;SOC&nbsp;Teams&nbsp;Can&nbsp;Close&nbsp;the&nbsp;RMM&nbsp;Visibility&nbsp;Gap&nbsp;<\/h2>\n\n\n\n<p>Phishing-to-RMM attacks cannot be handled like ordinary malware delivery. The payload may be legitimate, the infrastructure may be trusted, and the domain may not have a malicious reputation at the time of analysis.<\/p>\n\n\n\n<p>To detect this activity earlier, SOC teams need visibility into the full attack chain, not just the final file. That means connecting:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>the&nbsp;phishing&nbsp;page&nbsp;that&nbsp;initiated&nbsp;the&nbsp;download&nbsp;<\/li>\n\n\n\n<li>the&nbsp;file&nbsp;or&nbsp;script&nbsp;delivered&nbsp;to&nbsp;the&nbsp;user&nbsp;<\/li>\n\n\n\n<li>the&nbsp;execution&nbsp;path&nbsp;on&nbsp;the&nbsp;endpoint&nbsp;<\/li>\n\n\n\n<li>attempts&nbsp;to&nbsp;weaken&nbsp;security&nbsp;controls&nbsp;<\/li>\n\n\n\n<li>RMM&nbsp;installation&nbsp;behavior&nbsp;<\/li>\n\n\n\n<li>outbound&nbsp;connections&nbsp;to&nbsp;remote&nbsp;access&nbsp;infrastructure&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This is where ANY.RUN helps teams close the gap. With the <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>, security teams can safely examine suspicious URLs, files, and scripts during triage.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"567\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/screen-3-1024x567.png\" alt=\"Phishing-to-RMM\u00a0attack\u00a0chain\u00a0exposed\u00a0inside\u00a0ANY.RUN\u00a0sandbox\" class=\"wp-image-20562\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/screen-3-1024x567.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/screen-3-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/screen-3-768x425.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/screen-3-1536x850.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/screen-3-2048x1133.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/screen-3-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/screen-3-270x149.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/screen-3-740x409.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Phishing-to-RMM&nbsp;attack&nbsp;chain&nbsp;exposed&nbsp;inside&nbsp;ANY.RUN&nbsp;sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>They can observe the phishing lure, delivered payload, execution flow, attempts to weaken security controls, RMM installation, and outbound connections in one controlled environment.<\/p>\n\n\n\n<p>ANY.RUN <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence<\/a> adds the retrospective layer. Teams can search across public analyses, track phishing-to-RMM chains, pivot from one indicator to related activity, and understand whether a single event is part of a wider campaign.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"553\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image8-1024x553.png\" alt=\"Sandbox\u00a0analyses\u00a0linked\u00a0to\u00a0phishing-to-RMM\u00a0attacks\u00a0displayed\u00a0inside\u00a0TI\u00a0Lookup\u00a0\" class=\"wp-image-20563\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image8-1024x553.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image8-300x162.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image8-768x415.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image8-1536x829.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image8-2048x1106.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image8-370x200.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image8-270x146.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/image8-740x400.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Sandbox&nbsp;analyses&nbsp;linked&nbsp;to&nbsp;phishing-to-RMM&nbsp;attacks&nbsp;displayed&nbsp;inside&nbsp;TI&nbsp;Lookup<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>For CISOs, this means more control over a risk that is usually hard to prove. The SOC can validate suspicious remote access activity faster, show how the access path started, and give leadership clearer evidence for containment and follow-up decisions.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n<span class=\"highlight\">Strengthen<\/span> early threat detection across your SOC. <br>\nSee suspicious activity clearly and <span class=\"highlight\">act with confidence. <span class=\"highlight\"> <br><\/span><\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=rmm-blind-spot &#038;utm_term=280426&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nPower up your SOC\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Instead of relying on reputation-based signals or waiting for a high-confidence malware alert, security teams can prove when trusted tools are being abused. That gives CISOs stronger confidence in detection coverage, faster response readiness, and better visibility into whether approved remote access software is creating hidden business risk.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About&nbsp;ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams detect, investigate, and respond to threats faster.<\/p>\n\n\n\n<p>ANY.RUN solutions include <a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>, <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a>, <a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>, and integrations for SOC workflows across SIEM, SOAR, EDR, and other security tools. Together, they help teams analyze suspicious files and URLs, uncover attacker behavior, enrich investigations with real-world threat context, and operationalize intelligence across their environment.<\/p>\n\n\n\n<p>Built for security-conscious organizations, ANY.RUN is <a href=\"https:\/\/any.run\/compliance\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rmm-blind-spot&amp;utm_term=280426&amp;utm_content=linktocompliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2 Type II<\/a> attested and supports enterprise-ready controls such as SSO, MFA, granular privacy settings, and AES-256-CBC encryption.<\/p>\n\n\n\n<p>Trusted by more than <strong>15,000 organizations<\/strong> and <strong>600,000 security professionals worldwide<\/strong>, ANY.RUN gives SOC teams the visibility they need to move from uncertain alerts to evidence-based decisions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CISOs are under pressure to prove that their security programs can detect threats early, reduce business risk, and support fast, confident response. But that becomes harder when attackers stop relying on obviously malicious tools. In recent phishing-to-RMM campaigns observed by ANY.RUN analysts, threat actors are using fake Microsoft, Adobe, and OneDrive pages to deliver legitimate [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":20575,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,15],"class_list":["post-20522","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing-to-RMM Attacks: The Blind Spot CISOs Need to Close<\/title>\n<meta name=\"description\" content=\"Phishing-to-RMM attacks abuse trusted remote management tools to gain unauthorized access. See why this creates a visibility gap for CISOs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GridGuardGhoul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/\"},\"author\":{\"name\":\"GridGuardGhoul\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can\u2019t Ignore\u00a0\",\"datePublished\":\"2026-04-28T12:01:34+00:00\",\"dateModified\":\"2026-04-28T12:21:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/\"},\"wordCount\":1884,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/\",\"name\":\"Phishing-to-RMM Attacks: The Blind Spot CISOs Need to Close\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2026-04-28T12:01:34+00:00\",\"dateModified\":\"2026-04-28T12:21:02+00:00\",\"description\":\"Phishing-to-RMM attacks abuse trusted remote management tools to gain unauthorized access. See why this creates a visibility gap for CISOs.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can\u2019t Ignore\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"GridGuardGhoul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/01\/image_GridGuardGhoul.jpeg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/01\/image_GridGuardGhoul.jpeg\",\"caption\":\"GridGuardGhoul\"},\"description\":\"I am a network security researcher and reverse engineer exploring malware, protocols, and exploits.\",\"url\":\"#molongui-disabled-link\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing-to-RMM Attacks: The Blind Spot CISOs Need to Close","description":"Phishing-to-RMM attacks abuse trusted remote management tools to gain unauthorized access. See why this creates a visibility gap for CISOs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/","twitter_misc":{"Written by":"GridGuardGhoul","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/"},"author":{"name":"GridGuardGhoul","@id":"https:\/\/any.run\/"},"headline":"Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can\u2019t Ignore\u00a0","datePublished":"2026-04-28T12:01:34+00:00","dateModified":"2026-04-28T12:21:02+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/"},"wordCount":1884,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/","url":"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/","name":"Phishing-to-RMM Attacks: The Blind Spot CISOs Need to Close","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2026-04-28T12:01:34+00:00","dateModified":"2026-04-28T12:21:02+00:00","description":"Phishing-to-RMM attacks abuse trusted remote management tools to gain unauthorized access. See why this creates a visibility gap for CISOs.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/rmm-blind-spot-for-cisos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Phishing-to-RMM Attacks: The Remote Access Blind Spot CISOs Can\u2019t Ignore\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"GridGuardGhoul","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/01\/image_GridGuardGhoul.jpeg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/01\/image_GridGuardGhoul.jpeg","caption":"GridGuardGhoul"},"description":"I am a network security researcher and reverse engineer exploring malware, protocols, and exploits.","url":"#molongui-disabled-link"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/20522"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=20522"}],"version-history":[{"count":40,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/20522\/revisions"}],"predecessor-version":[{"id":20579,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/20522\/revisions\/20579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/20575"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=20522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=20522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=20522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}