Remote Access Tools: The Hidden Threat Exploited by Malicious Actors

Mitigating the trendy threat of cyber criminals LOTL (living off the land)

If there’s one significant decade-long trend that happened and is here to stay, it is the ability to work remotely and screen-share. It is for this reason that we have such a plethora of powerful tools to remotely share screens. Many expanded their capabilities to include remote control and that’s where the criminals really started to notice.

By end of the year, I’d be surprised if research doesn’t highlight what a large percentage of threats’ initial vector was via legitimate remote access tools. No fancy multi-stage infection was required for a C2 channel. LoTL is faster, better, cheaper (for the criminal).

The state of exploitation is so horrific already that CISA, earlier this year, issued a Joint Guidance: Identifying and Mitigating Living Off the Land Techniques, with a strong focus on Remote Access Tools.

This blog article is written specifically for the purpose of offering systems administrators a comprehensive list of remote access tools and how they can be blocked. Most organizations will want their own official choice of remote access tool to function, but disallow all others. That’s what we’re aiming for here as well.

To start with, here’s a list of products that have been researched to varying degrees and classified into one of two tables, ones that can knowingly be blocked by DNS&DTTS (first table below) and ones that are self-hosted and for which Zero Trust connectivity is required in order to block unknown/untagged FQDNs+DTTS:

Blockable by DNS black-holing (DTTS also sometimes required):

Remote Tool Domains to block (with subdomains) DTTS* Notes
Anydesk anydesk.com Free option, very popular
TakeControl (aka BeAnywhere) comserver.corporate.beanywhere.com mspa.n-able.com swi-rc.com swi-tc.com swi-rc.cdn-sw.net Used mostly by legitimate MSPs
Chrome Remote Desktop remotedesktop.google.com
Domotz domotz.com
DWAgent dwservice.net
FixMeIT fixme.it techinline.net
Fleetdeck* agentmqtt.fleetdeck.io Yes
Iperius Remote* iperiusremote.com global.iperius-rs.com iperius.com Yes
Itarian on-premise.itarian.com remoteaccess.itarian.com ra.itarian.com
Level.io level.io
GoToMyPC (Logmein)* gotomypc.com Yes
ManageEngineRMM manageengine.com
Parsec* parsec.app Yes
PQD Deploy pqd.com pqd.tools e9d69694c3d8f7465fd531512c22bd0f.r2.cloudflarestorage.com
Pulseway* pulseway.com Yes Uses many geo-specific domains for RD services
RemotePC remotepc.com
RemoteAssistance (MS) remoteassistance.support.services.microsoft.com
ScreenConnect screenconnect.connectwise.com Note it can also be self-hosted
SetMe set.me
Splashtop relay.splashtop.com api.splashtop.com
Supremo license.nanosystems.it dispatcher.nanosystems.it onlinestatus.nanosystems.it banner.nanosystems.it console.supremocontrol.com ecommerce.nanosystems.it Appears to use a TeamViewer white label
TeamViewer teamviewer.com Yes
Twingate twingate.com Yes Not observed in malicious use
Ultraviewer ultraviewer.net Similar experience to TeamViewer - easy exe launch for end-user
ZohoAssist assist.zohocloud.ca zohoassist.com zohomeeting.com Free 15-day trial for any email address validation

* Remote tool persistence is reliably blocked by DTTS®. Some tools are purposefully designed to work so that even when DNS failures occur, sysadmin remote access continues to function. This is by design for good purposes, but can also be hijacked by malicious actors.

RMM Remote Access Tools using self-hosted models, apply whitelabels or other existing vendors

The following tools are included for reference, even though there isn’t a given set of domains or IPs where such tools are hosted. For your organization to be protected from such hosted services, Zero Trust connectivity offers the protection you need.

Remote Tool Notes
Atera Uses Anydesk as preferred remote access tool
Bomgar Self-hosted and not generally a threat as it’s economically usually out of reach by most threat actors
Radmin Free trial with full functionality, hence it is easy for an attacker to use in a campaign
RMS (Remote Manipulator System) Only ever seen in use for malicious purposes
Remcos* Self-hosted, free version, reported used by attackers even integrates with Telegram bot
RemoteUtilities Never observed for malicious use, usually licensed and self-hosted for internal, enterprise use only
RPort Self-hosted
RSAT No longer available to download
Rustdesk “Open source alternative to TeamViewer” and, therefore self-hosted for the controller
ScreenConnect Listed above also for ConnectWise-hosted versions, but there’s also a self-hosted version available
SimpleHelp
Sorrilus
SuperOps This vendor uses Splashtop
Syncro This vendor uses Splashtop
TacticalRMM Self-hosted tool
Wazuh Open-source SIEM endpoint agent is open for abuse
ZeroTier Overlay network that can facilitate P2P connections, but not a remote access tool in itself

Subscribe to our blocklist

If you’re running adam:ONE, log into your dashboard and you can subscribe to our blocklist here.

Simply enable it on all policies where you wish to block these known remote access tools.

For DTTS to be enabled, a plan that includes the feature will be required.

Enabling resources actually in use in your enterprise

If you blanket-block the above known remote access tools and yet you wish to use one legitimately by policy, a Forwarding Rule can be used as an exemption from a blocklist.

For example, the ADAMnetworks team uses a Bomgar appliance, and even though it isn’t in the blocklist above as it’s self-hosted, I will use it as an example to demonstrate how it can be exempted even if it were on a blocklist:

  1. Create a resolver to use if you don’t already have one, we suggest Quad9:

  2. Create a forwarding rule if you don’t already have one, call it “Exempt from all filtering”:

  3. Enable the rule on all policies where the rule should be applied:

Notes

Some tools are listed twice if a version of the tool fits into more than one category as different versions of the tool behave differently.

In each category, tools are listed in alphabetical order, but there’s a clear delineation between tools favoured by bad guys vs good guys.

Tools that work with direct connections did not make it on the list, e.g. MobaXterm, Apple Remote Desktop, VNC, Microsoft Remote Desktop, NetSupport, RemoteRipple etc. For such tools to be exploited, the attacker would need additional resources such as port-forwarding, or adding an overlay network and Windows firewall modification, etc.

Online meeting tools allowing for remote desktop are not listed, but we must be aware that combined with enhanced social engineering, could also be used for remote control, such as these three major ones:

If any of the details are out-of-date in the future, we would welcome any feedback on our support email from users and sysadmins alike with updates that may be required.

1 Like