In the ever-evolving landscape of cyber threats, hackers have continued to exploit remote access tools to compromise organizations with alarming persistence.
One particular tool, ConnectWise ScreenConnect, previously known as ConnectWise Control, has found itself increasingly at the center of sophisticated malware delivery campaigns targeting financial institutions, service providers, and other high-value businesses worldwide.
The appeal of ConnectWise ScreenConnect to attackers is clear: as a legitimate and trusted remote monitoring and management solution, its presence on corporate networks is rarely questioned, allowing attackers to infiltrate and persist with minimal suspicion.
The attack chain typically begins with skillfully crafted phishing emails, often disguised as invoices or urgent work-related communications.
These emails arrive with malicious attachments or direct links prompting users to download a seemingly harmless file, named in a way that mimics business-related documents or support tools.
Once the user executes this file, a malicious dropper is activated.
Notably, recent campaigns have used executable files that are digitally signed with compromised or abused ConnectWise certificates, thereby evading many standard security checks built into operating systems like Windows.
Upon execution, the dropper surreptitiously installs ScreenConnect on the victim system, granting attackers covert, persistent, and privileged remote access.

A particularly sophisticated element observed in these attacks is the utilization of the CHAINVERB downloader, which has been linked to a group identified in security circles as UNC5952.
CHAINVERB is highly evasive, leveraging authentic digital signatures to further lower its profile on targeted machines.
The malware communicates with its command-and-control servers using addresses embedded in digital certificate fields or connects directly to hardcoded IP addresses.
Once installed, CHAINVERB enables attackers to perform reconnaissance, capture screenshots and user inputs, and set the stage for deeper system compromise or data exfiltration.
Analysts have also seen these tools used for lateral movement within networks, as well as for deploying additional payloads, including ransomware or remote shell access components.
To help defenders identify these attacks, security analysts often rely on custom threat hunting queries in their endpoint detection tools.
For instance, they may search for processes where ConnectWise is the digital signer but whose parent application is an email client or web browser, which can indicate execution resulting from phishing.

By analyzing such process relationships, defenders may spot suspicious remote access installations that would otherwise blend in with legitimate administrative activity.
Security teams are also advised to monitor for unexpected outbound connections to certain newly identified domains or direct IP addresses associated with CHAINVERB command-and-control infrastructure.
Defensive Strategies And Best Practices
According to CyberProof, The ongoing abuse of ConnectWise ScreenConnect highlights the urgent need for organizations to strengthen their defenses around remote access tools and adopt more sophisticated monitoring and response capabilities.
Foremost among recommended actions is an immediate review and update of all ConnectWise ScreenConnect installations.
The vendor has released security advisories and patches for vulnerable versions, but the upgrade process is intricate.
Administrators must follow a prescribed sequence of updates, as skipping intermediate versions due to architectural changes can leave systems exposed.
For example, moving from an early version like 2.1 up to the latest 23.9.8 or above requires stepwise upgrades through several interim releases to ensure full patch coverage.
Beyond patching, organizations should implement layered security controls.
This includes deploying robust phishing detection solutions, conducting regular phishing awareness training, and instituting strict application allowlisting policies that block unauthorized or unsigned executables from running within the environment.
It is also critical to audit network and endpoint activity for the presence of unapproved remote access tools and to implement network segmentation and firewall rules that restrict RMM access to only necessary segments or through company-controlled VPNs and virtual desktops.
Defenders should further enable memory-based malware detection, as modern attack techniques sometimes launch RMM tools directly from memory, bypassing file-based detection altogether.
Key indicators for compromise in these attacks include the emergence of ScreenConnect installations with suspicious parent processes, malicious domain connections such as specific newly registered support-related subdomains, and the presence of known malicious file hashes associated with CHAINVERB and related downloaders.
By staying vigilant, promptly applying security updates, and continually refining their detection capabilities, organizations can better defend their networks against the persistent and evolving threat posed by the misuse of legitimate remote access tools like ConnectWise ScreenConnect.
The growing sophistication of these adversaries underscores the importance of a proactive, multi-layered security strategy tailored to today’s dynamic and deceptive threat environment.





