News: 1770926833

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Who's the bossware? Ransomware slingers like employee monitoring tools, too

(2026/02/12)


Your supervisor may like using employee monitoring apps to keep tabs on you, but crims like the snooping software even more. Threat actors are now using legit bossware to blend into corporate networks and attempt ransomware deployment.

In late January and early February, the Huntress response team spotted two intrusions in which criminals chained Net Monitor for Employees Professional with remote monitoring and management (RMM) tool SimpleHelp, and then attempted to deploy ransomware on the victims' computers.

While the crims were ultimately unsuccessful, the security incidents highlight how miscreants love to use [1]legitimate, commercial software for nefarious purposes because it makes it easier for them to hide inside enterprise IT environments.

[2]

"RMMs and employee monitoring tools blend in amongst legitimate signed binaries," Michael Tigges, senior security operations analyst at Huntress, told The Register , adding that "this is a rare case of the employee monitoring software being co-opted for subsequent access."

[3]

[4]

While neither of the victims' employers uses Net Monitor, repurposing this type of employee monitoring software falls into the "same category of RMM abuse," Tigges said. "Delineating which may be malicious and benign at first glance is exceedingly difficult. Adversaries know this as well."

The victims, we're told, were from different industry sectors, and "likely targets of opportunity rather than any specifically targeted group," he added.

This is a rare case of the employee monitoring software being co-opted for subsequent access

Tigges points out that "there are legitimate use cases for employee monitoring software - chiefly around data loss prevention."

This particular brand of bossware, however, does a whole lot more than passive screen monitoring. It can also establish remote shell connections and remotely execute commands on users' desktops. That makes it ideal for crims to use, even without modifying or infecting the installers.

[5]

"Threat actors leveraged this capability for hands-on-keyboard reconnaissance, additional tooling delivery, and deploying secondary remote access channels, effectively turning an employee monitoring tool into a fully functional RAT (remote access trojan)," Tigges and fellow threat hunters Anna Pham, Dray Agha, and Anton Ovrutsky [6]wrote in a Wednesday blog.

As The Register previously reported, [7]spying on workers is also bad for morale and doesn't inspire loyalty to the company, not to mention that employer-sanctioned RATs are creepy as all hell.

Here's what went down

In the first case that the Huntress team observed in late January, the attacker somehow installed Net Monitor for Employees on the victim's machine. Huntress doesn't know how the intruder gained initial access.

But once they had broken in, the criminals set to work manipulating user accounts via multiple net commands. This included attempting to identify valid usernames, reset passwords, and create new admin-user accounts on the host.

"As we kept pulling on investigative threads, we observed the 'Net Monitor for Employees' terminal pulling down a file via PowerShell named vhost.exe from the IP address of 160.191.182[.]41," the threat hunters wrote.

[8]

The executable turned out to be SimpleHelp, which the attacker then used in multiple attempts to tamper with Windows Defender. When this wasn't successful, the intruder tried to deploy multiple versions of Crazy ransomware linked to VoidCrypt.

In the second incident, which happened in early February, the attacker used a compromised third-party SSL VPN account to gain initial access to the victim's computer. Next, they connected to a domain controller using remote desktop protocol, launched a PowerShell session, and installed the Net Monitor agent, configuring the reverse connection to call back to an attacker-controlled console.

Net Monitor allows users to customize the service and process names, and the intruder took advantage of this to disguise the agent as Microsoft OneDrive, registering the service as OneDriveSvc, naming the process OneDriver.exe, and renaming the running binary to svchost.exe.

[9]Bossware booms as bots determine whether you're doing a good job

[10]Ransomware crews add 'EDR killers' to their arsenal – and some aren't even malware

[11]Notepad's new Markdown powers served with a side of remote code execution

[12]Payroll pirates are conning help desks to steal workers' identities and redirect paychecks

Then, the intruder installed SimpleHelp and configured it to monitor for keywords that would indicate cryptocurrency wallets, exchanges, blockchain explorers, and payment platforms. This, Huntress notes, indicates "the threat actor's financial motivation extends beyond ransomware to direct cryptocurrency theft."

The SimpleHelp agent also monitored for remote tool access keywords including RDP, AnyDesk, TeamViewer, and VNC.

Meanwhile, they used Net Monitor for Employees Professional to perform network reconnaissance on the compromised domain controller, probe internal network segments, and map out the network settings.

Huntress says shared infrastructure used in both cases, plus the reuse of the vhost.exe filename and overlapping IP addresses, "strongly suggest" a single attacker or group behind the two intrusions.

And to prevent becoming the next victim, turn on multi-factor authentication (MFA) on all remote access services and external-facing applications, and limit remote access to only those users and systems that require it to do their jobs.

The security analysts also suggest conducting regular audits of all third-party RMM tools and employee monitoring software, and monitoring for any unusual process execution chains. ®

Get our [13]Tech Resources



[1] https://www.theregister.com/2025/03/31/ransomware_crews_edr_killers/

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aY5bjMf-Pt9WePe5SnbHvAAAABc&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aY5bjMf-Pt9WePe5SnbHvAAAABc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aY5bjMf-Pt9WePe5SnbHvAAAABc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aY5bjMf-Pt9WePe5SnbHvAAAABc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://www.huntress.com/blog/employee-monitoring-simplehelp-abused-in-ransomware-operations

[7] https://www.theregister.com/2025/11/23/bossware_monitor_remote_employees/

[8] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aY5bjMf-Pt9WePe5SnbHvAAAABc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[9] https://www.theregister.com/2025/11/23/bossware_monitor_remote_employees/

[10] https://www.theregister.com/2025/03/31/ransomware_crews_edr_killers/

[11] https://www.theregister.com/2026/02/11/notepad_rce_flaw/

[12] https://www.theregister.com/2026/02/11/payroll_pirates_business_social_engineering/

[13] https://whitepapers.theregister.com/



A rare case?

ecofeco

For now.

Delineating which may be malicious and benign

Anonymous Coward

For employee monitoring software?

What is the "benign" use there?

It may be "legitimate" but isn't benign and is always used with malice in mind.

A reader reports that when the patient died, the attending doctor
recorded the following on the patient's chart: "Patient failed to fulfill
his wellness potential."
Another doctor reports that in a recent issue of the *American Journal
of Family Practice* fleas were called "hematophagous arthropod vectors."
A reader reports that the Army calls them "vertically deployed anti-
personnel devices." You probably call them bombs.
At McClellan Air Force base in Sacramento, California, civilian
mechanics were placed on "non-duty, non-pay status." That is, they were fired.
After taking the trip of a lifetime, our reader sent his twelve rolls
of film to Kodak for developing (or "processing," as Kodak likes to call it)
only to receive the following notice: "We must report that during the handling
of your twelve 35mm Kodachrome slide orders, the films were involved in an
unusual laboratory experience." The use of the passive is a particularly nice
touch, don't you think? Nobody did anything to the films; they just had a bad
experience. Of course our reader can always go back to Tibet and take his
pictures all over again, using the twelve replacement rolls Kodak so generously
sent him.
-- Quarterly Review of Doublespeak (NCTE)