Spam Campaign Distributes Fake PDFs, Deploys Remote Monitoring Tools for Ongoing Access


An ongoing spam campaign that leverages social engineering to deploy legitimate Remote Monitoring and Management (RMM) software on victim networks.

By disguising malicious payloads as essential Adobe Acrobat updates, threat actors are successfully bypassing traditional security controls and establishing persistent remote access to sensitive systems.

The campaign begins with a deceptive email delivering a PDF attachment. These emails often masquerade as important notifications, such as invoices, payment receipts, or shared documents, prompting the user to view the file immediately.

When the victim opens the attached PDF, they are not presented with a document but rather a static image mimicking a blurred document or a security prompt.

A prominent button often labeled “Open in Adobe Reader to Access this File” urges the user to click to view the content.

This is a common phishing tactic designed to move the victim from a protected email environment to a malicious webpage controlled by the attacker.

Clicking the link redirects the user to a spoofed webpage designed to look exactly like a legitimate Adobe Acrobat download center. The page displays a warning claiming that “Adobe Reader is not detected or out of date” and automatically initiates a download.

Unlike traditional malware campaigns that install custom viruses or trojans, this attack downloads a genuine executable installer for commercial RMM software.

In this specific campaign, LevelBlue researchers observed the deployment of two specific RMM variants: Trustconnect and Datto RMM.

RMM tools are powerful software suites used by IT administrators to manage computers remotely. They allow for full control over a system, including file transfer, software installation, and desktop control.

Because these tools are digitally signed by reputable vendors and widely used in corporate environments, they are often trusted by antivirus (AV) and Endpoint Detection and Response (EDR) solutions.

The Danger of “Living off the Land”

This technique is known as “Living off the Land” (LotL). By installing legitimate software, threat actors can blend in with normal network traffic. To a security analyst, the activity looks like a standard IT administrative task rather than a breach.

Once installed, the RMM tool creates a backdoor. The attacker can then:

  • Maintain Persistence: Access the machine anytime, even after reboots.
  • Evade Detection: Bypass security scans that allow legitimate administrative tools.
  • Escalate Privileges: Use the tool’s system-level permissions to move deeper into the network or deploy ransomware.

This campaign highlights the need for vigilance regarding “update” prompts originating from email attachments. Security teams should monitor for unauthorized RMM installations and block known malicious domains associated with these fake download pages.

Users are advised to only download software updates directly from official vendor websites, never from links inside a PDF or email.

IOCs

Indicator TypeContext / DescriptionValue
URLInitial Redirect / Phishing Linkhxxps[://]99d04a7a-345a-487c-8ea3-a9a626aa773e-00-3qpe7rminty[.]com/e/WlppNUlubg
URLPayload Delivery / Fake Landing Pagehxxps[://]adb-pro[.]design/Adobe/landing[.]php
SHA-256Lure Document (scanned_document.pdf)0432f2e433bf42aaff0f078d500dd6f47c2500a8c8560601d8eadd0d9b365861
SHA-256Fake Installer Payload (Adobe_Reader_Installer.exe – TrustConnect)edde2673becdf84e3b1d823a985c7984fec42cb65c7666e68badce78bd0666c0
SHA-256Fake Installer Payload (Adobe_Reader_Installer.exe – Datto RMM)ae42e874b598cce517c40f9314bdef94828ba20f15bb7f8026187573f26fff9f

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.





Source link