ThreatIntelligence-IncidentResponse

Uptick in Bomgar RMM Exploitation


Acknowledgments: Special thanks to Olly Maxwell, Josh Kiriakoff, Jordan Sexton, Ryan Dowd, Jamie Dumas, Amelia Casley, Austin Worline, and Lindsey O’Donnell-Welch for their contributions to this research and blog.

Over the past two weeks, the Huntress Security Operations Center (SOC) has seen an uptick in incidents involving compromised Bomgar remote monitoring and management (RMM) instances. The uptick follows intermittent waves of exploitation we have seen over the past two months, after BeyondTrust first disclosed a critical-severity flaw (CVE-2026-1731) in Bomgar in February.

On February 6, 2026, BeyondTrust issued fixes for the flaw in Bomgar (rebranded as BeyondTrust Remote Support), which could be exploited by an unauthenticated attacker to remotely execute code. During this timeframe, the SOC observed an initial spike in exploitation of Bomgar RMMs starting on February 12, which involved at least 10 impacted organizations. Then, starting around April 3, the SOC saw another increase in attacks. 

Currently, we do not have further insight into the specific root cause behind these attacks, but the incidents likely stem from the exploitation of CVE-2026-1731. We see malicious processes stemming from bomgar-scc.exe, and we can see that the impacted organizations are running versions of Bomgar that are outdated.  

Key takeaways

  • Huntress has seen multiple incidents involving Bomgar RMM since April 3, 2026. One of those incidents on April 14 involved ransomware deployed from the Bomgar RMM instance at a dental software company, which impacted three downstream companies. Another incident on April 15 on a Managed Service Provider (MSP) led to the mass isolation of 78 businesses, and we observed subsequent exploitation across four downstream customers.
  • In some incidents, threat actors have used the compromised Bomgar instances to deploy the LockBit ransomware. Based on several clues, the threat actors behind the attacks are suspected to be using the previously leaked LockBit 3.0 builder.

  • Threat actors have also used their access via Bomgar to conduct domain reconnaissance, perform network enumeration via NetScan, add Administrator users for persistence, and execute further RMMs like AnyDesk and Atera.

  • This most recent uptick in Bomgar-related incidents follows an initial wave of attacks observed by the SOC in February, when CVE-2026-1731 was first disclosed. 

Figure 1: Detection timeline showing malicious processes stemming from bomgar-scc.exe

The tradecraft

Targeting downstream customers

In several incidents, threat actors used compromised Bomgar RMMs belonging to organizations in order to target their downstream customer base. On April 15, Huntress observed a serious compromise involving an MSP Bomgar account with high privileges that was used to deploy remote access tools onto a domain controller. By targeting an MSP, the attackers were able to establish persistence on downstream client environments managed by the MSP.

The actor moved quickly to conduct account reconnaissance, create a new local account, and elevate it first into the Local Administrators Group and then into Domain Admins—effectively creating a persistent backdoor with domain-wide control. The intrusion did not stop at privilege escalation. With administrative control in place, the actor deployed additional remote access tools including AnyDesk (C:UserssupportDocumentsAnyDesk.exe). 

LockBit ransomware deployment

SOC analysts saw multiple incidents that resulted in the deployment of LockBit ransomware, and observed several similarities across the incidents. 

In another incident that was first detected on April 14, a ransomware campaign hit multiple organizations through a compromised Bomgar remote support environment. The compromised RMM instance belonged to a dental software company with software installed across dozens of organizations. Here are some of the tactics we saw threat actors taking after accessing victim environments:

  • Adding credentials for a user (Adminpwd123.1) and then adding the user to the Local Administrators Group and Domain Administrative Group (net  localgroup administrators [REDACTED] /add  and net group “domain admins” [REDACTED] /add) as a persistence mechanism.

  • Utilizing a ScreenConnect remote access client as an additional persistence mechanism in the targeted environment (which was seen with C:Program Files (x86)ScreenConnect Client (0a42c9161c039ecc))

  • Executing LB3.exe from the user’s Desktop via a command prompt session and targeting multiple directories (including local drives and the Microsoft SQL Server installation path).


Figure 2: Timeline of threat actor activity before executing LB3.exe

In a separate incident on April 12, SOC analysts observed a rogue Bomgar RMM instance being used to gain access to endpoints, which resulted in successful ransomware execution on the network. Here, we also saw threat actors use the rogue RMM instance to create and add a new user to the Local Administrators Group.

However, in this incident, threat actors also aimed to kill security tooling by deployed suspicious drivers, seen in the binary paths C:WindowsSystem32drivershrwfpdrv.sys and C:tempPoisonX.sys. The latter (PoisonX.sys) may be linked to PoisonKiller, a Bring Your Own Vulnerable Driver (BYOVD) tool designed to terminate EDR agents (the tool was likely listed on GitHub at the beginning of April, but has since been removed).

The SOC also observed the actor using HRSword.exe, which is legitimate software abused by cybercriminals to bypass security defenses. 

Finally, the threat actor executed the ransomware binary through the Bomgar RMM session, resulting in the successful encryption of the endpoint via (again) the executable LB3.exe

One noteworthy aspect of this incident was that the ransom note dropped during the attack did not match the “style” of LockBit ransomware attacks we have seen in the past. The SOC saw a similarly styled ransom note dropped in an April 9 incident, where the Huntress agent was added to the targeted endpoint mid-compromise, and both ransom notes shared the same email  (lokbt9@onionmail[.]org). There are several potential reasons why the style of the ransom note appears to be different, but one possibility is that the threat group behind this incident was using the LockBit builder that had previously been leaked in 2022.  


Figure 3: An excerpt from the ransom note 

Other TTPs

We observed several other tactics across attacks involving Bomgar RMMs. In another incident seen on April 14, threat actors used their access via a compromised Bomgar instance to add a built-in account (WDAGUtilityAccount) to the Administrator Group and Remote Desktop Users, before setting the credentials for the account to 123123qwEqwE (a password that’s been seen in previous incidents). This account then executed the AnyDesk remote desktop application and executed NetScan, a network enumeration tool.

We also saw threat actors using their existing access via the Bomgar RMM to deploy additional RMMs for further persistence, something we’ve seen frequently in the past. During an April 5 incident, the threat actors first performed domain reconnaissance (via nltest.exe) and then installed a new user account and added it to the local Administrators group and Domain Admins group. Finally, they installed AnyDesk as seen in the following command line: anydesk.exe  –install “C:Program Files (x86)AnyDesk”

Figure 4: A comparison of some of the recent incidents involving Bomgar the SOC has seen

In an April 3 incident, the SOC saw threat actors use a Bomgar remote access session to execute commands through the Bomgar remote shell interface with SYSTEM privileges. These included launching Windows Installer (msiexec.exe) in the PerfLogs directory (C:WindowsSystem32msiexec.exe /i C:PerfLogssetup.msi). The setup.msi was an installer for the Atera remote management tool. Separately, a scheduled task was created (AteraAgentServiceWatchdog).

The Bomgar client (which was signed by Bomgar Corporation) was an outdated version vulnerable to CVE-2026-1731 (version 21.1.3). These clues led the SOC to suspect that the attackers in this particular incident were exploiting Bomgar’s existing vulnerability, which has been patched since February in version 25.3.2 of Bomgar/Remote Support (versions 25.3.1 and prior are impacted) and version 25.1 of Privileged Remote Access (versions 24.3.4 and prior are impacted).


Figure 5: Fixed versions of Bomgar RMM 

Many of these TTPs were seen during previous incidents since the initial disclosure of CVE-2026-1731. During the course of a retrospective threat hunt, we also observed an incident likely to have started March 11 stemming from suspicious Bomgar activity. Here, a renamed SimpleHelp RMM was dropped onto the system, which was executed out of the PerfLogs directory (c:PerfLogsInputUpdate.exe) and configured to the IP address 146.70.41[.]131.

Ongoing incidents

We wanted to highlight this recent uptick in exploitation of this specific RMM, leading to the access of partner environments. Here are a few ways that businesses can protect themselves, particularly if they already have Bomgar in their environments:

  • Make sure that you have applied the patches for CVE-2026-1731 (check out BeyondTrust’s security advisory for more information)

  • Monitor environments for suspicious users added to the Local Administrators/Domain Administrators groups

  • Audit RMMs in order to track ones that are currently used or authorized. Check curated lists like LOLRMM to better understand what RMM tools could potentially be abused by threat actors

  • Check logs for instances where RMMs were executed to find suspicious RMMs

  • Check the versions that your Bomgar/Remote Support or Privileged Remote Access device is running by logging into the /appliance admin interface and viewing the software version on the status page. 

Indicators of Compromise 

Indicator

Description

LB3.exe 

SHA256: 538b3b36dd8a30e721cc8dc579098e984cf8ed30b71d55303db45c7344f7a4cf

Ransomware executable in April 12 incident

LB3.exe 

SHA256: 3529b1422da886b7d04555340dfb1efd44a625c2921af6df39819397176956d6

Ransomware executable in April 14 incident

Adminpwd123.1

Password used by attacker in April 14 incident

123123qwEqwE

Password used by attacker in April 14 incident

InputUpdate.exe

SHA256: 

bc9635dcc3444c18b447883c6bc1931e5373e48c7dbfaa607285a9fb668b03ea

Renamed SimpleHelp RMM on March 11

146.70.41[.]131

IP address configured to March 11 SimpleHelp RMM 

lokbt9@onionmail[.]org

Email on ransom note in April 12 incident

HRSword.exe 

SHA256: b44dd12179a15a7d89c18444d36e8d70b51d30c7989d3ab71330061401f731fe

HRSword tool used by threat actors in April 12 incident

PoisonX.sys 

SHA256: a5035cbd6c31616288aa66d98e5a25441ee38651fb5f330676319f921bb816a4

Driver used by threat actor in April 12 incident

hrwfpdrv.sys

Driver used by threat actor in April 12 incident



Source link