Cybercrooks are using free trials of Remote Monitoring and Management (RMM) tools to distribute ransomware, security experts are warning.
Blackpoint Cyber founder and CEO Jon Murchison says in order to protect from the rising threat, RMM companies need to have more checks and balances on their free trial system, while everyone else needs to have multi-factor authentication (MFA) active on their RMM.
Explaining the stages of the attack, Murchison explained that the attacker would first use phishing to try and obtain the target’s VPN credentials. After logging onto the target endpoint, the threat actor would then install the trial version of the RMM, and use that to deploy stage-two malware, usually ransomware.
Keeping tabs on free trials
The way trial systems are set up is definitely an issue, Murchison says, but the lack of MFA also makes the job easier for crooks.
“The RMM companies need to have a lot more checks and balances on their free trial system—not just letting people download them with no background checks,” he said.
“I think a lot of the big ones do that, but there are some smaller ones, and foreign ones, that don’t. They need to make sure there is some sort of gate with the free trial. You can’t just sign up with a Gmail or some made-up account and get it. You need to talk to people. You need to know you are dealing with a real human and not a bad guy.”
This is hardly a new issue, though. Murchison further stated that his company has been warning of this threat for a year now, adding that just in the past three weeks, there had been at least five such attacks.
“The message is MSPs really need to look at their software inventory, if they use one RMM and they see another one pop up, that should be something you pay attention to,” the CEO concluded.