In a concerning escalation of cyber threats, ransomware gangs are increasingly exploiting Remote Monitoring and Management (RMM) tools to infiltrate and compromise organizations, enabling stealthy persistence, lateral movement, and data exfiltration. This tactic, highlighted in recent investigations by Cato CTRL on July 22, 2025, mirrors broader trends where legitimate IT tools are weaponized for malicious ends. In a related development, cleaning products giant Clorox has filed a $380 million lawsuit against IT provider Cognizant, alleging that help desk staff inadvertently handed over employee passwords to hackers during a 2023 cyberattack, underscoring vulnerabilities in outsourced IT support. Both issues highlight the risks of trusted tools and services becoming entry points for sophisticated attacks, urging organizations to bolster security protocols.
RMM tools, designed for IT teams to manage remote devices efficiently, have become a favored vector for ransomware operators due to their inherent trust and powerful capabilities. Cato CTRL's threat research, based on incidents from late 2024 to early 2025, revealed how groups like Hunters International, Medusa, and unidentified actors abused tools such as AnyDesk, ScreenConnect, and SimpleHelp in real-world attacks on U.S. and U.K. organizations in manufacturing, construction, and non-profit sectors.Key observations include:
CISA's #StopRansomware advisory on Interlock ransomware also notes RMM abuse for initial access and persistence. Earlier incidents, like DragonForce exploiting SimpleHelp in May 2025 to target MSP clients, further illustrate this trend.
In a stark example of human error enabling breaches, Clorox filed a lawsuit on July 22, 2025, in California federal court against Cognizant, claiming the IT provider's help desk staff provided hackers with employee passwords without proper verification, facilitating a devastating 2023 cyberattack by the Scattered Spider group. The attack disrupted operations, causing product shortages and $380 million in damages, including $50 million in remediation costs.Details from the lawsuit:
This lawsuit ties into the RMM theme, as both involve misuse of trusted IT management processes for unauthorized access.
These developments amplify concerns over the dual-use nature of RMM tools and outsourced support, where legitimate access mechanisms become attack vectors. Ransomware attacks rose 3% in 2024, with 2025 projections indicating further growth, driven by tools like RMMs enabling efficient, evasive operations. For organizations, this means potential data breaches, operational downtime, and financial losses, as seen in Clorox's case. The Clorox incident also raises questions about vendor accountability in cybersecurity, potentially influencing future contracts and regulations.
To counter these threats:
As cyber threats evolve, organizations must treat IT tools and vendors as potential weak links, prioritizing proactive security to mitigate these risks. For the latest advisories, consult CISA and vendor resources.