ScreenConnect Attack: SmartScreen Bypass and RMM Abuse
An attack campaign targeting organizations in the US, Canada, UK, and Northern Ireland exploits ConnectWise ScreenConnect vulnerabilities. The attack chain begins with a spoofed email containing a malicious .cmd attachment, which executes silently, escalates privileges, disables Windows SmartScreen, and removes the Mark-of-the-Web. It then installs a legitimate Remote Monitoring and Management tool, ScreenConnect, which is abused as a Remote Access Trojan for persistent command-and-control access. The campaign focuses on sectors with high-value data, including government, healthcare, and logistics. The attackers use various techniques to evade detection, including UAC bypass, registry modification, and silent MSI installation. The ScreenConnect client used has a revoked certificate, highlighting the importance of blocking vulnerable software versions and enforcing strict RMM allowlists.
AI Analysis
Technical Summary
The ScreenConnect attack campaign leverages a multi-stage attack chain targeting organizations primarily in North America and parts of the UK. It starts with a spoofed phishing email containing a malicious .cmd script attachment that executes silently upon opening. This script escalates privileges on the victim machine, disables Windows SmartScreen—a security feature designed to block untrusted applications—and removes the Mark-of-the-Web attribute to prevent warning prompts. Subsequently, the attackers install ConnectWise ScreenConnect, a legitimate Remote Monitoring and Management (RMM) tool, but abuse it as a Remote Access Trojan (RAT) to maintain persistent command-and-control (C2) access. The ScreenConnect client used in this campaign carries a revoked digital certificate, which indicates the attackers are using outdated or compromised software versions to evade detection. The attackers employ multiple evasion techniques including User Account Control (UAC) bypass, registry modifications to disable security features, and silent MSI installations to avoid user awareness and security alerts. The campaign focuses on sectors with sensitive and high-value data such as government, healthcare, and logistics, which are attractive targets for espionage or ransomware. The use of a legitimate RMM tool complicates detection because such software is often whitelisted or trusted in enterprise environments. Indicators of compromise include specific file hashes and a malicious domain (dof-connect.top). Although no known public exploits are reported, the campaign demonstrates advanced social engineering and privilege escalation tactics, highlighting the need for strict controls around RMM tools and email security.
Potential Impact
For European organizations, particularly those in government, healthcare, and logistics sectors, this threat poses significant risks. The abuse of a legitimate RMM tool like ScreenConnect allows attackers to gain persistent, stealthy remote access, potentially leading to data exfiltration, espionage, or ransomware deployment. Disabling SmartScreen and bypassing UAC reduces the effectiveness of built-in Windows security controls, increasing the likelihood of successful compromise. The stealthy installation and execution methods hinder detection by traditional endpoint security solutions. Given the targeting of UK and Northern Ireland, European organizations with similar profiles or using ScreenConnect are at risk. The impact includes potential loss of confidentiality of sensitive data, disruption of critical services, and reputational damage. The campaign’s focus on high-value sectors aligns with strategic interests in Europe, where healthcare and government data protection are heavily regulated. The use of revoked certificates and social engineering complicates incident response and forensic investigations. Overall, the threat could lead to significant operational and financial consequences if not mitigated effectively.
Mitigation Recommendations
1. Enforce strict allowlisting policies for Remote Monitoring and Management (RMM) tools, permitting only verified and up-to-date versions of ScreenConnect and similar software. 2. Implement advanced email filtering and phishing detection mechanisms to block spoofed emails and malicious attachments, especially .cmd files. 3. Monitor and restrict the use of scripts and MSI installers that execute silently or modify system settings. 4. Enable and enforce Windows SmartScreen and UAC policies without exceptions; investigate any attempts to disable these features. 5. Regularly audit installed software certificates and block execution of binaries signed with revoked or untrusted certificates. 6. Employ endpoint detection and response (EDR) solutions capable of detecting privilege escalation, registry modifications, and unusual RMM tool behaviors. 7. Conduct user awareness training focused on phishing and social engineering tactics used to deliver malicious attachments. 8. Maintain comprehensive logging and monitoring of RMM tool usage and network connections to detect anomalous command-and-control activity. 9. Segment networks to limit lateral movement from compromised endpoints, especially in critical sectors. 10. Collaborate with threat intelligence providers to update detection signatures and indicators of compromise (IOCs) such as the provided hashes and domains.
Affected Countries
United Kingdom, Northern Ireland, Ireland, Germany, France, Netherlands, Belgium
Indicators of Compromise
- hash: 1db8b9fa0bdcbfaab807f715c288c19a
- hash: 0fa008dfd45f39879412275d1a4c178cf7affae2
- hash: 46fce36f4901d6acf19aaaa9cbd1a14df6d6aa85
- hash: 48a5034e75b526e1a9371b4e728b02fb81d2c7c1
- hash: b46c4e4694783311e2c612ed7f0ca67a88e1e352
- hash: fde73710ce063bbf1e377c02a1a8615cf4da1c08
- hash: b8100e5ab07983cbf82d721cf719576ca3f60e352628dcaabd42d428011fdedf
- domain: dof-connect.top
ScreenConnect Attack: SmartScreen Bypass and RMM Abuse
Description
An attack campaign targeting organizations in the US, Canada, UK, and Northern Ireland exploits ConnectWise ScreenConnect vulnerabilities. The attack chain begins with a spoofed email containing a malicious .cmd attachment, which executes silently, escalates privileges, disables Windows SmartScreen, and removes the Mark-of-the-Web. It then installs a legitimate Remote Monitoring and Management tool, ScreenConnect, which is abused as a Remote Access Trojan for persistent command-and-control access. The campaign focuses on sectors with high-value data, including government, healthcare, and logistics. The attackers use various techniques to evade detection, including UAC bypass, registry modification, and silent MSI installation. The ScreenConnect client used has a revoked certificate, highlighting the importance of blocking vulnerable software versions and enforcing strict RMM allowlists.
AI-Powered Analysis
Technical Analysis
The ScreenConnect attack campaign leverages a multi-stage attack chain targeting organizations primarily in North America and parts of the UK. It starts with a spoofed phishing email containing a malicious .cmd script attachment that executes silently upon opening. This script escalates privileges on the victim machine, disables Windows SmartScreen—a security feature designed to block untrusted applications—and removes the Mark-of-the-Web attribute to prevent warning prompts. Subsequently, the attackers install ConnectWise ScreenConnect, a legitimate Remote Monitoring and Management (RMM) tool, but abuse it as a Remote Access Trojan (RAT) to maintain persistent command-and-control (C2) access. The ScreenConnect client used in this campaign carries a revoked digital certificate, which indicates the attackers are using outdated or compromised software versions to evade detection. The attackers employ multiple evasion techniques including User Account Control (UAC) bypass, registry modifications to disable security features, and silent MSI installations to avoid user awareness and security alerts. The campaign focuses on sectors with sensitive and high-value data such as government, healthcare, and logistics, which are attractive targets for espionage or ransomware. The use of a legitimate RMM tool complicates detection because such software is often whitelisted or trusted in enterprise environments. Indicators of compromise include specific file hashes and a malicious domain (dof-connect.top). Although no known public exploits are reported, the campaign demonstrates advanced social engineering and privilege escalation tactics, highlighting the need for strict controls around RMM tools and email security.
Potential Impact
For European organizations, particularly those in government, healthcare, and logistics sectors, this threat poses significant risks. The abuse of a legitimate RMM tool like ScreenConnect allows attackers to gain persistent, stealthy remote access, potentially leading to data exfiltration, espionage, or ransomware deployment. Disabling SmartScreen and bypassing UAC reduces the effectiveness of built-in Windows security controls, increasing the likelihood of successful compromise. The stealthy installation and execution methods hinder detection by traditional endpoint security solutions. Given the targeting of UK and Northern Ireland, European organizations with similar profiles or using ScreenConnect are at risk. The impact includes potential loss of confidentiality of sensitive data, disruption of critical services, and reputational damage. The campaign’s focus on high-value sectors aligns with strategic interests in Europe, where healthcare and government data protection are heavily regulated. The use of revoked certificates and social engineering complicates incident response and forensic investigations. Overall, the threat could lead to significant operational and financial consequences if not mitigated effectively.
Mitigation Recommendations
1. Enforce strict allowlisting policies for Remote Monitoring and Management (RMM) tools, permitting only verified and up-to-date versions of ScreenConnect and similar software. 2. Implement advanced email filtering and phishing detection mechanisms to block spoofed emails and malicious attachments, especially .cmd files. 3. Monitor and restrict the use of scripts and MSI installers that execute silently or modify system settings. 4. Enable and enforce Windows SmartScreen and UAC policies without exceptions; investigate any attempts to disable these features. 5. Regularly audit installed software certificates and block execution of binaries signed with revoked or untrusted certificates. 6. Employ endpoint detection and response (EDR) solutions capable of detecting privilege escalation, registry modifications, and unusual RMM tool behaviors. 7. Conduct user awareness training focused on phishing and social engineering tactics used to deliver malicious attachments. 8. Maintain comprehensive logging and monitoring of RMM tool usage and network connections to detect anomalous command-and-control activity. 9. Segment networks to limit lateral movement from compromised endpoints, especially in critical sectors. 10. Collaborate with threat intelligence providers to update detection signatures and indicators of compromise (IOCs) such as the provided hashes and domains.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.forcepoint.com/blog/x-labs/screenconnect-attack"]
- Adversary
- null
- Pulse Id
- 698dadc62e15016f807eaccc
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash1db8b9fa0bdcbfaab807f715c288c19a | — | |
hash0fa008dfd45f39879412275d1a4c178cf7affae2 | — | |
hash46fce36f4901d6acf19aaaa9cbd1a14df6d6aa85 | — | |
hash48a5034e75b526e1a9371b4e728b02fb81d2c7c1 | — | |
hashb46c4e4694783311e2c612ed7f0ca67a88e1e352 | — | |
hashfde73710ce063bbf1e377c02a1a8615cf4da1c08 | — | |
hashb8100e5ab07983cbf82d721cf719576ca3f60e352628dcaabd42d428011fdedf | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaindof-connect.top | — |
Threat ID: 698e4e5cc9e1ff5ad82069ed
Added to database: 2/12/2026, 10:04:12 PM
Last enriched: 2/12/2026, 10:19:31 PM
Last updated: 2/20/2026, 10:58:16 PM
Views: 245
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
MediumDNS Used to Hide Fake Investment Platform Schemes
MediumUncovering Malicious Cryptocurrency Scam Domains and Hacked YouTube Channels
MediumClickFix in action: how fake captcha can encrypt an entire company
MediumFake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.