A recent active phishing campaign, identified under the codename VENOMOUS#HELPER, has been reported to be targeting various organizations since at least April 2025. This malicious endeavor involves legitimate Remote Monitoring and Management (RMM) software to facilitate sustained remote access to compromised systems.

Securonix’s analysis indicates that the campaign has affected over 80 entities, predominantly located in the United States. This effort shows correlations with previously identified clusters monitored by cybersecurity firms such as Red Canary and Sophos, the latter referring to the activity as STAC6405. While the identities of the perpetrators remain unknown, evidence suggests they may be aligned with a financially motivated Initial Access Broker (IAB) or a ransomware precursor operation.

The phishing attacks initiate with emails that mimic communications from the U.S. Social Security Administration (SSA), urging recipients to confirm their email addresses and download a supposed SSA statement. The embedded link directs users to a compromised but legitimate Mexican business website, strategically chosen to evade email spam filters.

Upon clicking the link, victims download a file from another attacker-controlled domain, which contains the SimpleHelp RMM tool disguised as a document. Analysts believe that the attackers gained access to a legitimate hosting server through a compromised cPanel account, allowing them to stage the malicious binary.

Once the victim executes the seemingly innocuous file, malware installs itself as a Windows service with Safe Mode persistence. It features a “self-healing watchdog” that ensures its survival even if terminated, periodically checking for installed security products and monitoring user activity. This behavior is indicative of tactics associated with the MITRE ATT&CK framework, specifically initial access, persistence, and privilege escalation.

To establish comprehensive interactive control, the SimpleHelp client secures elevated privileges through the legitimate Windows API function AdjustTokenPrivileges. Additionally, a legitimate executable linked to the software is exploited to gain SYSTEM-level access, which empowers attackers to capture screens, input keystrokes, and manipulate resources in the user’s environment.

This sophisticated access mechanism is further employed to download and install ConnectWise ScreenConnect, which serves as a backup communication channel in case the SimpleHelp connection is interrupted. The replicated capabilities of both RMM tools suggest an intent to maintain a “redundant dual-channel access architecture” that ensures uninterrupted operations.

The deployed version of SimpleHelp (5.0.1) grants extensive remote administration capabilities, essentially leaving victim organizations vulnerable to silent command execution within user sessions. While standard antivirus solutions may overlook this malicious activity—identifying only legitimately signed software from a reputable vendor—the implications for compromised entities are substantial. Attackers could pivot to other systems within the network with ease, demonstrating the urgent need for enhanced monitoring and response protocols in today’s heightened threat landscape.

As the cybersecurity domain continues to evolve, understanding the methods and tactics employed in attacks such as VENOMOUS#HELPER is critical for businesses aiming to fortify their defenses against increasingly sophisticated threats.

Found this article interesting? Follow us on Google News, Twitter, and LinkedIn to read more exclusive content we post.