Hackers Continue Exploiting ConnectWise ScreenConnect Tool to Deliver Malware

Cybersecurity analysts observed a significant uptick in attacks leveraging ConnectWise ScreenConnect, a widely used remote monitoring and management (RMM) tool, to deliver sophisticated malware in global phishing campaigns.

This wave of malicious activity has primarily targeted financial organizations, relying on deceptive emails built around invoice themes to distribute malware-laden executables.

The underlying threat campaign is associated with the CHAINVERB backdoor, a downloader strongly linked to the financially motivated UNC5952 threat group.

Technical Modus Operandi

Attackers are exploiting vulnerabilities in ConnectWise ScreenConnect (versions 23.9.7 and prior), as initially reported by an independent security researcher.

ScreenConnect
Malicious url in the email leading to download of Document.exe 

The latest campaigns involve malicious droppers signed with valid ConnectWise digital certificates, a tactic that enables the executables to bypass many security controls by appearing as legitimate software.

The CHAINVERB downloader cleverly embeds its command-and-control (C2) URLs within digital certificates, providing an added layer of stealth.

Once executed, the malware drops the ConnectWise Control tool, enabling remote access to infected systems.

Threat actors are observed using socially engineered emails, often impersonating trusted business entities and leveraging document-related themes (e.g., invoices, Adobe Reader, Zoom installers) to entice victims into downloading the malicious payloads.

According to CyberProof Report, these emails frequently contain URLs to compromised websites or hosting platforms.

Once downloaded, the malware initiates clandestine remote desktop sessions to attacker-controlled infrastructure, allowing for internal reconnaissance and exfiltration activities, such as screenshot capture and lateral movement.

Key attacks in this campaign have leveraged top-level domains (TLDs) like “.top” and “dns.net” for C2 communications and malware delivery.

For example, analysts detected phishing emails from senders such as “[email protected],” delivering a digitally signed “Download.exe” linked to the domain visionary-clafoutis-308e89[.]netlify[.]app.

ScreenConnect
File is digitally signed by Connectwise, LLC 

The CHAINVERB binary was observed connecting to C2 domains such as kasin22.anondns.net and yertoje.uzhelp.top.

Ongoing Investigation

On May 28, 2025, ConnectWise issued a security advisory acknowledging a potential breach by a nation-state threat group, with ongoing investigations led by Mandiant.

While it remains unclear whether all recent attacks are connected to this incident, the observable trend highlights a persistent risk associated with RMM tool abuse in the wild.

Cyber defenders are strongly encouraged to upgrade to ScreenConnect version 23.9.8 or later, following prescribed upgrade paths to mitigate the risk from the known vulnerabilities.

Further, organizations should rigorously audit usage of RMM software across their environments, implement controls for signed software execution, and train users to recognize phishing attempts.

Additional mitigations include blocking unauthorized remote access, monitoring network logs, and restricting RMM use to secure channels such as VPNs or VDIs.

The continued abuse of ConnectWise ScreenConnect serves as a critical reminder for organizations to prioritize secure remote access tool deployment, robust user awareness, and proactive threat hunting for early detection of evolving threats.

Indicators of Compromise (IOCs)

TypeIndicatorDescription
Domainkasin22.anondns.netC2 server
Domainyertoje.uzhelp.topC2 server
Domainwww.helpw8.topMalicious phishing page
IP Address176.123.10.175C2 server
Email Sender[email protected]Phishing email address
File Hash (MD5)a01a80d8c1f665eda5a81391a1ed0024Malicious executable
File Hash (SHA-1)b1568b6001450646e2526f6836ca77cb8b3fc7e0Malicious executable
File Hash (SHA-256)d6d75807c23ebfb34eceaa10037f2a911dd50128135cb968811c50b0f1d69eeaMalicious executable

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Update

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here