Skip to content
Threat Feed
medium advisory

DNS Queries to RMM Domains from Non-Browser Processes

Detection of DNS queries to known remote monitoring and management (RMM) domains originating from non-browser processes on Windows systems indicates potential abuse of legitimate software for command and control.

This brief focuses on the abuse of legitimate Remote Monitoring and Management (RMM) software by threat actors. RMM tools are often used for legitimate IT administration but can be leveraged for malicious purposes such as command and control, persistence, and lateral movement within a compromised network. This activity is identified by detecting DNS queries to a list of known RMM service domains originating from processes that are not typical web browsers. This behavior indicates that an RMM client, script, or other non-browser application is attempting to communicate with an RMM service. The detection rule was published on 2026-03-23 by Elastic and aims to surface unauthorized or malicious use of RMM tools within an organization. It is crucial to differentiate between legitimate and malicious RMM usage by analyzing the context of these DNS queries.

Attack Chain

  1. An attacker gains initial access to a Windows system through an unknown method.
  2. The attacker installs or deploys a legitimate RMM tool or a modified version.
  3. The RMM agent is configured to communicate with the attacker’s command and control infrastructure.
  4. A non-browser process (e.g., a script or a standalone executable) initiates a DNS query to resolve an RMM domain (e.g., teamviewer.com, anydesk.com).
  5. The DNS query is resolved, establishing a network connection between the compromised system and the RMM service or attacker-controlled server.
  6. The attacker leverages the RMM tool to execute commands, transfer files, and maintain persistent access to the compromised system.
  7. The attacker performs lateral movement to other systems within the network, utilizing the RMM tool for remote administration.
  8. The attacker achieves their objective, such as data exfiltration or ransomware deployment, using the established RMM connection.

Impact

Compromise via RMM tools can lead to significant damage, including unauthorized access to sensitive data, disruption of business operations, and potential ransomware attacks. Successful exploitation allows attackers to maintain persistent access and control over affected systems, facilitating lateral movement and further malicious activities. The widespread use of RMM tools in various sectors makes this a broad threat. The impact can range from a single compromised workstation to the complete takeover of an organization’s IT infrastructure.

Recommendation

  • Deploy the provided Sigma rule to your SIEM to detect DNS queries to RMM domains from non-browser processes and tune for your environment.
  • Review the IOC list of RMM domains and block any unauthorized RMM services at your DNS resolver.
  • Investigate any alerts generated by the Sigma rule by examining the process tree and verifying the legitimacy of the process initiating the DNS query.
  • Implement application control policies to restrict the execution of unauthorized RMM tools on your endpoints.
  • Enable Sysmon DNS event logging to activate the rules above.

Detection coverage 2

DNS Query to Known RMM Domain from Non-Browser Process

medium

Detects DNS queries to known RMM domains from processes excluding common web browsers.

sigma tactics: command_and_control sources: dns_query, windows

Process Connecting to Known RMM Domain

medium

Detects a non-browser process initiating a network connection to an IP address associated with a known RMM domain.

sigma tactics: command_and_control sources: network_connection, windows

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

74

domain

TypeValue
domainteamviewer.com
domainlogmein.com
domainlogmeinrescue.com
domainlogmeininc.com
domaininternapcdn.net
domainanydesk.com
domainscreenconnect.com
domainconnectwise.com
domainsplashtop.com
domainzohoassist.com
domaindwservice.net
domaingotoassist.com
domaingetgo.com
domainrustdesk.com
domainremoteutilities.com
domainatera.com
domainammyy.com
domainn-able.com
domainkaseya.net
domainbomgar.com
domainbeyondtrustcloud.com
domainparsec.app
domainparsecusercontent.com
domaintailscale.com
domaintwingate.com
domainjumpcloud.com
domainvnc.com
domainremotepc.com
domainnetsupportsoftware.com
domaingetscreen.me
domainbeanywhere.com
domainswi-rc.com
domainswi-tc.com
domainqetqo.com
domaintmate.io
domainplayanext.com
domainsupremocontrol.com
domainitarian.com
domaindatto.com
domainauvik.com
domainsyncromsp.com
domainpulseway.com
domainimmy.bot
domainimmybot.com
domainlevel.io
domainninjarmm.com
domainninjaone.com
domaincentrastage.net
domaindatto.net
domainliongard.com
domainnaverisk.com
domainpanorama9.com
domainsuperops.ai
domainsuperops.com
domaintacticalrmm.com
domainmeshcentral.com
domainremotly.com
domainfixme.it
domainislonline.com
domainzoho.eu
domaingoverlan.com
domainiperius.net
domainiperiusremote.com
domainremotix.com
domainmikogo.com
domainr-hud.net
domainpcvisit.de
domainnetviewer.com
domainhelpwire.app
domainremotetopc.com
domainrport.io
domainaction1.com
domaintiflux.com
domaingotoresolve.com