Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

ScreenConnect Attack: SmartScreen Bypass and RMM Abuse

0
Medium
Published: Thu Feb 12 2026 (02/12/2026, 10:39:02 UTC)
Source: AlienVault OTX General

Description

An attack campaign targeting organizations in the US, Canada, UK, and Northern Ireland exploits ConnectWise ScreenConnect vulnerabilities. The attack chain begins with a spoofed email containing a malicious .cmd attachment, which executes silently, escalates privileges, disables Windows SmartScreen, and removes the Mark-of-the-Web. It then installs a legitimate Remote Monitoring and Management tool, ScreenConnect, which is abused as a Remote Access Trojan for persistent command-and-control access. The campaign focuses on sectors with high-value data, including government, healthcare, and logistics. The attackers use various techniques to evade detection, including UAC bypass, registry modification, and silent MSI installation. The ScreenConnect client used has a revoked certificate, highlighting the importance of blocking vulnerable software versions and enforcing strict RMM allowlists.

AI-Powered Analysis

AILast updated: 02/12/2026, 22:19:31 UTC

Technical Analysis

The ScreenConnect attack campaign leverages a multi-stage attack chain targeting organizations primarily in North America and parts of the UK. It starts with a spoofed phishing email containing a malicious .cmd script attachment that executes silently upon opening. This script escalates privileges on the victim machine, disables Windows SmartScreen—a security feature designed to block untrusted applications—and removes the Mark-of-the-Web attribute to prevent warning prompts. Subsequently, the attackers install ConnectWise ScreenConnect, a legitimate Remote Monitoring and Management (RMM) tool, but abuse it as a Remote Access Trojan (RAT) to maintain persistent command-and-control (C2) access. The ScreenConnect client used in this campaign carries a revoked digital certificate, which indicates the attackers are using outdated or compromised software versions to evade detection. The attackers employ multiple evasion techniques including User Account Control (UAC) bypass, registry modifications to disable security features, and silent MSI installations to avoid user awareness and security alerts. The campaign focuses on sectors with sensitive and high-value data such as government, healthcare, and logistics, which are attractive targets for espionage or ransomware. The use of a legitimate RMM tool complicates detection because such software is often whitelisted or trusted in enterprise environments. Indicators of compromise include specific file hashes and a malicious domain (dof-connect.top). Although no known public exploits are reported, the campaign demonstrates advanced social engineering and privilege escalation tactics, highlighting the need for strict controls around RMM tools and email security.

Potential Impact

For European organizations, particularly those in government, healthcare, and logistics sectors, this threat poses significant risks. The abuse of a legitimate RMM tool like ScreenConnect allows attackers to gain persistent, stealthy remote access, potentially leading to data exfiltration, espionage, or ransomware deployment. Disabling SmartScreen and bypassing UAC reduces the effectiveness of built-in Windows security controls, increasing the likelihood of successful compromise. The stealthy installation and execution methods hinder detection by traditional endpoint security solutions. Given the targeting of UK and Northern Ireland, European organizations with similar profiles or using ScreenConnect are at risk. The impact includes potential loss of confidentiality of sensitive data, disruption of critical services, and reputational damage. The campaign’s focus on high-value sectors aligns with strategic interests in Europe, where healthcare and government data protection are heavily regulated. The use of revoked certificates and social engineering complicates incident response and forensic investigations. Overall, the threat could lead to significant operational and financial consequences if not mitigated effectively.

Mitigation Recommendations

1. Enforce strict allowlisting policies for Remote Monitoring and Management (RMM) tools, permitting only verified and up-to-date versions of ScreenConnect and similar software. 2. Implement advanced email filtering and phishing detection mechanisms to block spoofed emails and malicious attachments, especially .cmd files. 3. Monitor and restrict the use of scripts and MSI installers that execute silently or modify system settings. 4. Enable and enforce Windows SmartScreen and UAC policies without exceptions; investigate any attempts to disable these features. 5. Regularly audit installed software certificates and block execution of binaries signed with revoked or untrusted certificates. 6. Employ endpoint detection and response (EDR) solutions capable of detecting privilege escalation, registry modifications, and unusual RMM tool behaviors. 7. Conduct user awareness training focused on phishing and social engineering tactics used to deliver malicious attachments. 8. Maintain comprehensive logging and monitoring of RMM tool usage and network connections to detect anomalous command-and-control activity. 9. Segment networks to limit lateral movement from compromised endpoints, especially in critical sectors. 10. Collaborate with threat intelligence providers to update detection signatures and indicators of compromise (IOCs) such as the provided hashes and domains.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.forcepoint.com/blog/x-labs/screenconnect-attack"]
Adversary
null
Pulse Id
698dadc62e15016f807eaccc
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash1db8b9fa0bdcbfaab807f715c288c19a
hash0fa008dfd45f39879412275d1a4c178cf7affae2
hash46fce36f4901d6acf19aaaa9cbd1a14df6d6aa85
hash48a5034e75b526e1a9371b4e728b02fb81d2c7c1
hashb46c4e4694783311e2c612ed7f0ca67a88e1e352
hashfde73710ce063bbf1e377c02a1a8615cf4da1c08
hashb8100e5ab07983cbf82d721cf719576ca3f60e352628dcaabd42d428011fdedf

Domain

ValueDescriptionCopy
domaindof-connect.top

Threat ID: 698e4e5cc9e1ff5ad82069ed

Added to database: 2/12/2026, 10:04:12 PM

Last enriched: 2/12/2026, 10:19:31 PM

Last updated: 2/20/2026, 10:58:16 PM

Views: 245

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats