Who looks at who? Experts Reveal Criminals Using Fake Business Software to Gain Access to Company Systems



  • Proofpoint Discovered Fake “TrustConnect” RMM Tool Created as Cover for RAT Malware
  • The criminals created a website, paid for a certificate, and tricked companies into $300-a-month subscriptions.
  • The tool gave attackers full remote control; linked to Redline data theft client

A group of cybercriminals went to great lengths to infect companies with a Remote Access Trojan (RAT), creating an entire company, coding a website, and paying thousands of dollars for a legitimate certificate.

In its report, Proofpoint said it was quite common for cybercriminals to use legitimate remote monitoring and management (RMM) tools in their technology stack. They would trick their victims into installing the tool of their choice and sharing login credentials, allowing them to deploy all types of stage two malware, including information stealers, remote access Trojans, or ransomware.



Leave a Comment

Your email address will not be published. Required fields are marked *