Who is watching who? Experts Reveal Criminals Using Fake Enterprise Software to Access Company Systems


  • Proofpoint discovered fake RMM tool “TrustConnect” designed to cover RAT malware
  • The criminals created a website, paid for a certificate, and deceived businesses into offering $300/month subscriptions.
  • The tool gave attackers full remote control; related to Redline infostealer client

A group of cybercriminals went to great lengths to infect businesses with a remote access Trojan (RAT), creating an entire company, coding a website, and paying thousands of dollars for a legitimate certificate.

In its report, Proofpoint said it is quite common for cybercriminals to use legitimate remote monitoring and management (RMM) tools in their technology stack. They would trick their victims into installing their tool of choice and sharing their login credentials, allowing them to deploy all kinds of second-stage malware, including information stealers, remote access Trojans, or ransomware.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top