News: 1771544781

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Crims create fake remote management vendor that actually sells a RAT

(2026/02/20)


Researchers at Proofpoint late last month uncovered what they describe as a "weird twist" on the growing trend of criminals abusing remote monitoring and management software (RMM) as their preferred attack tools.

These folks created an entirely fake RMM vendor that purports to sell enterprise software for $300 a month. In fact, it's a remote access trojan (RAT) being sold as a service. Call it a RATaaS.

The criminals behind the malware took great care to make their product appear legitimate, giving it the name TrustConnect. They even built a fake business website and obtained a legitimate Extended Validation code-signing certificate to digitally sign malware and allow it to bypass security controls.

[1]

At first, the crooks even fooled Proofpoint’s threat hunters themselves. "Initially, TrustConnect appeared to be another legitimate RMM tool being abused," the company’s research team [2]said in a Thursday post.

[3]

[4]

Criminals prefer using [5]legitimate, commercial software for nefarious purposes because it makes it easier for them to hide inside enterprise IT environments.

Over the past year or so, RMM tools have moved to the top of [6]attackers' must-have list . There are [7]many of them to choose from , enterprises already use and trust many of these tools, and they provide a direct, remote pipeline to victims' machines for [8]deploying ransomware , info-stealers, and other malware, and maintaining long-term access to infected systems.

[9]

Security shop Huntress, in its annual cyber threat report released this week, noted [10]skyrocketing RMM abuse , jumping 277 percent in 2025 compared to the year prior and accounting for 24 percent of all observed incidents.

Abuse of Trust(Connect)

The domain, trustconnectsoftware[.]com, was created on January 12 and the website there was probably written by an AI, according to Proofpoint.

"The malware creator uses the domain as the 'business website' designed to convince the public (including certificate providers) that the software is a legitimate RMM app, providing fake details like customer statistics and software documentation," the team wrote.

This website is also where criminals purchase (via cryptocurrency) a monthly subscription to use the service, and it acts as a command-and-control (C2) center for the malware.

The domain also likely made it easier for the malware operators to purchase a legitimate EV certificate to sign the malware. While the certificate has since been revoked as of February 6, any files signed before then remain valid. Proofpoint credits researchers at The Cert Graveyard for assisting in the revocation of the certificate.

[11]

The malware's C2, hosted on 178[.]128[.]69[.]245, was also disrupted by Proofpoint and anonymous industry partners as of February 17. However, that doesn't appear to be costing the operators any business as they quickly spun up new infrastructure and began testing a rebranded version of the RAT.

"Shortly before publication of this report, Proofpoint analysts identified a pivot to parallel infrastructure and testing of a new agent payload, called 'DocConnect' or 'SHIELD OS v1.0,'" the researchers wrote.

The RAT backdoors users' machines and gives attackers full mouse and keyboard control, allowing them to record and stream the victim's screen. It also provides other typical remote desktop management capabilities such as file transfer, command execution, and user account control bypass.

Redline infostealer ties

Proofpoint has attributed the TrustConnect malware "with moderate confidence" to a Redline infostealer customer due to a Telegram handle: @zacchyy09. This was the contact info listed for support and sales inquiries on the TrustConnect website, and the handle was also mentioned as a [12]VIP customer in [13]Operation Magnus , the joint law enforcement effort to takedown the Redline and META information stealing malware in October 2024.

In the blog, the threat hunters detail several campaigns used to distribute the fake RMM, including a phishing operation that began January 26. The emails, sent in both English and French, purported to be invitations to submit a proposal and bid for an upcoming project – with a malicious link to the "full project package."

The URL leads to an executable file, MsTeams.exe, that drops another executable called TrustConnectAgent.exe and communicates with the TrustConnect RAT C2 server.

“Message volumes ranged from a few dozen to fewer than a thousand per campaign,” Proofpoint threat researcher Selena Larson, told The Register . “Campaigns also varied in terms of the number of customers receiving the messages which ranged from less than ten to over one hundred.”

[14]Ransomware scum disrupted utility services with SimpleHelp attacks

[15]DragonForce double-whammy: First hit an MSP, then use RMM software to push ransomware

[16]Ransomware crews don't care about your endpoint security – they've already killed it

[17]Who's the bossware? Ransomware slingers like employee monitoring tools, too

Other lures used by criminals distributing TrustConnect mention taxes, shared documents, meeting invitations, events, and government themes, we're told.

Plus, multiple campaigns delivered different – legitimate – RMMs alongside TrustConnect, including ScreenConnect and LogMeIn Resolve.

"The use of legitimate remote enterprise tooling both alongside and as a follow-on malware suggest this RAT is very much embedded with the overall ecosystem of threat actors abusing these tools, and the MaaS provider is likely selling to the same customers abusing real RMM payloads and infrastructure in campaigns," Proofpoint noted. ®

Get our [18]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aZfqcSNsr7TxmJmbjnpSKgAAAYk&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZfqcSNsr7TxmJmbjnpSKgAAAYk&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aZfqcSNsr7TxmJmbjnpSKgAAAYk&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://www.theregister.com/2025/03/31/ransomware_crews_edr_killers/

[6] https://www.theregister.com/2025/06/12/cisa_simplehelp_flaw_exploit_warning/

[7] https://lolrmm.io/

[8] https://www.theregister.com/2025/05/28/dragonforce_ransomware_gang_sets_fire/

[9] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aZfqcSNsr7TxmJmbjnpSKgAAAYk&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[10] https://www.huntress.com/resources/2026-cyber-threat-report

[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aZfqcSNsr7TxmJmbjnpSKgAAAYk&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[12] https://www.theregister.com/2024/10/28/dutch_cops_pwn_the_redline/

[13] https://www.theregister.com/2024/10/29/russian_redline_malware/

[14] https://www.theregister.com/2025/06/12/cisa_simplehelp_flaw_exploit_warning/

[15] https://www.theregister.com/2025/05/28/dragonforce_ransomware_gang_sets_fire/

[16] https://www.theregister.com/2025/08/14/edr_killers_ransomware/

[17] https://www.theregister.com/2026/02/12/ransomware_slingers_bossware/

[18] https://whitepapers.theregister.com/



But?

ecofeco

How is this different from most ALL software these days?

Clearly ...

Throatwarbler Mangrove

This is a Remote Access Trojan Software as a Service, so the criminals are just showing that they give a RATSaaS.

Re: Clearly ...

Tim99

Best one I've seen here for a while. Have an upvote and a beer >>===>

It would be nice to be sure of anything the way some people are of everything.