Go offline with the Player FM app!
RMM Tools: The New Cybercrime Trick?
Manage episode 473190128 series 3348167
Hello to all our Remote Cyber Pals! Join host Selena Larson and guest host, Tim Kromphardt, a Senior Threat Researcher, as they chat with Staff Threat Researcher, Ole Villadsen, from Proofpoint. They explore the broader shift from traditional malware to commercially available tools that fly under the radar and how cybercriminals are increasingly abusing Remote Monitoring and Management (RMM) tools (sometimes called Remote Access Software) to gain initial access in email-based attacks.
Topics Covered:
- The growing use of such tools like ScreenConnect, Atera, and NetSupport in cyberattacks
- How threat actors are shifting from traditional malware loaders to commercially available tools
- TA583’s adoption of RMM tools as a primary attack method
- The role of social engineering in phishing lures, including Social Security scams
- The impact of cybersecurity influencers and scam-baiting YouTubers on threat awareness
- The ongoing arms race between cybercriminals and defenders
From stealthy intrusions to shifting cybercrime trends, this conversation uncovers the critical threats organizations face in 2025.
Resources Mentioned:
For more information about Proofpoint, check out our website.
Subscribe & Follow:
Stay ahead of emerging threats, and subscribe! Happy hunting!
84 episodes
Manage episode 473190128 series 3348167
Hello to all our Remote Cyber Pals! Join host Selena Larson and guest host, Tim Kromphardt, a Senior Threat Researcher, as they chat with Staff Threat Researcher, Ole Villadsen, from Proofpoint. They explore the broader shift from traditional malware to commercially available tools that fly under the radar and how cybercriminals are increasingly abusing Remote Monitoring and Management (RMM) tools (sometimes called Remote Access Software) to gain initial access in email-based attacks.
Topics Covered:
- The growing use of such tools like ScreenConnect, Atera, and NetSupport in cyberattacks
- How threat actors are shifting from traditional malware loaders to commercially available tools
- TA583’s adoption of RMM tools as a primary attack method
- The role of social engineering in phishing lures, including Social Security scams
- The impact of cybersecurity influencers and scam-baiting YouTubers on threat awareness
- The ongoing arms race between cybercriminals and defenders
From stealthy intrusions to shifting cybercrime trends, this conversation uncovers the critical threats organizations face in 2025.
Resources Mentioned:
For more information about Proofpoint, check out our website.
Subscribe & Follow:
Stay ahead of emerging threats, and subscribe! Happy hunting!
84 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.