Threat actors love to use legitimate remote management solutions for several steps in an attack chain. Orgs who legitimately use these applications should create use cases to detect suspicious activity and block the use of other unauthorized RMM tools including browser based RMM extensions
Comments