12 Threat Detection Trends IT Pros Should Know

Return To Article
12 Threat Detection Trends IT Pros Should Know, slide 8

Trend #9: Remote monitoring and management abuse

Adversaries will abuse remote monitoring and management (RMM) tools because they’re widely used for legitimate reasons and seem benign, says Red Canary. Typically, RMM has been used by helpdesk technicians to resolve issues on client computers. Adversaries can blend in while moving laterally, communicating with and passing information in and out of an infected host. Ransomware operators abuse RMM to remotely control victims’ machines and deploy additional malicious payloads. This makes it harder to catch adversaries.

Return To Article