<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AnyDesk — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/anydesk/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 23 Apr 2026 19:02:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/anydesk/feed.xml" rel="self" type="application/rss+xml"/><item><title>Trigona Ransomware Employing Custom Data Exfiltration Tool</title><link>https://feed.craftedsignal.io/briefs/2026-05-trigona-custom-exfil/</link><pubDate>Thu, 23 Apr 2026 19:02:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-trigona-custom-exfil/</guid><description>Trigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.</description><content:encoded><![CDATA[<p>Trigona ransomware, initially launched in October 2022, has been observed using a custom command-line tool named &ldquo;uploader_client.exe&rdquo; to exfiltrate data from compromised environments. This shift, observed in March 2026, suggests an effort to avoid detection by security solutions that commonly flag publicly available tools like Rclone and MegaSync. Symantec researchers believe this indicates a strategic investment in proprietary malware to maintain a lower profile during critical phases of attacks. The custom tool supports five simultaneous connections per file for faster data exfiltration via parallel uploads, rotates TCP connections after 2GB of traffic to evade monitoring, offers options for selective file type exfiltration, and utilizes an authentication key to restrict access to stolen data. Despite disruptions in October 2023, Trigona has resumed operations, incorporating additional techniques like installing the Huorong Network Security Suite tool HRSword and disabling security products.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the target system through unspecified means.</li>
<li>Installation of the Huorong Network Security Suite tool HRSword as a kernel driver service.</li>
<li>Deployment of tools such as PCHunter, Gmer, YDark, WKTools, DumpGuard, and StpProcessMonitorByovd to disable security-related products by leveraging vulnerable kernel drivers to terminate endpoint protection processes.</li>
<li>Execution of utilities with PowerRun to launch apps, executables, and scripts with elevated privileges, bypassing user-mode protections.</li>
<li>Deployment of AnyDesk for direct remote access to the breached systems.</li>
<li>Execution of Mimikatz and Nirsoft utilities for credential theft and password recovery operations.</li>
<li>Use of the custom &ldquo;uploader_client.exe&rdquo; to exfiltrate valuable documents such as invoices and PDFs from network drives via parallel uploads, rotating TCP connections to evade monitoring, and using an authentication key to restrict data access.</li>
<li>Final stage involving the deployment of Trigona ransomware, demanding ransom payment in Monero cryptocurrency.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Trigona ransomware attacks result in significant data theft and encryption, disrupting business operations and causing financial losses. The group has demonstrated the capability to resume operations even after suffering disruptions, indicating a persistent threat. Observed data exfiltration has included high-value documents such as invoices and PDFs, demonstrating a targeted approach to data theft. Victims face potential regulatory penalties, reputational damage, and recovery costs associated with restoring systems and data. The number of victims and specific financial impact varies per campaign, but the potential for severe disruption and financial strain is consistent.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of &ldquo;uploader_client.exe&rdquo; with command-line arguments indicative of data exfiltration (see Sigma rule below).</li>
<li>Implement network monitoring to detect connections to unusual or hardcoded server addresses used by the &ldquo;uploader_client.exe&rdquo; exfiltration tool (see IOC table).</li>
<li>Deploy endpoint detection rules to identify the installation of Huorong Network Security Suite (HRSword) as a kernel driver service and tools like PCHunter, Gmer, YDark, WKTools, DumpGuard, and StpProcessMonitorByovd.</li>
<li>Monitor for processes launched via PowerRun, especially if followed by credential dumping or remote access tool execution.</li>
<li>Review AnyDesk usage for unusual connections or after-hours access, as this tool is used for remote access.</li>
<li>Enable robust logging for credential access attempts and password recovery activity associated with Mimikatz and Nirsoft tools.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>trigona</category><category>ransomware</category><category>data exfiltration</category><category>custom tool</category></item><item><title>Multiple Remote Management Tool Vendors on Same Host</title><link>https://feed.craftedsignal.io/briefs/2024-01-multiple-rmm-vendors/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-multiple-rmm-vendors/</guid><description>This rule identifies Windows hosts where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.</description><content:encoded><![CDATA[<p>This detection rule identifies Windows systems running multiple Remote Monitoring and Management (RMM) tools from different vendors within an eight-minute timeframe. While legitimate MSP environments might utilize several tools, the presence of multiple RMM solutions on a single host can signify a compromise, unauthorized software installation (shadow IT), or attackers establishing redundant access points. The rule maps process names to vendor labels to avoid inflated counts from multiple binaries of the same vendor. This activity has been observed as a component of broader attack campaigns, including those leveraging compromised MSP infrastructure, and is described in CISA AA23-025A. The timeframe analyzed is &ldquo;now-9m&rdquo;, and the rule triggers if two or more different vendors are detected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system, possibly through phishing, exploiting vulnerabilities, or stolen credentials.</li>
<li>Tool Deployment: The attacker deploys an initial RMM tool (e.g., AnyDesk, TeamViewer) for remote access and control.</li>
<li>Persistence: The attacker establishes persistence by configuring the RMM tool to start automatically on system boot.</li>
<li>Lateral Movement: The attacker uses the initial access to discover other systems on the network.</li>
<li>Additional RMM Deployment: The attacker deploys a second RMM tool (e.g., ScreenConnect, Splashtop) from a different vendor to create a redundant access method.</li>
<li>Privilege Escalation: The attacker escalates privileges using the compromised RMM tools, if necessary.</li>
<li>Remote Control: The attacker uses the RMM tools to remotely control the system, execute commands, and access sensitive data.</li>
<li>Data Exfiltration or Further Exploitation: The attacker exfiltrates sensitive data or uses the compromised system to launch further attacks on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging multiple RMM tools can result in unauthorized access to sensitive data, system compromise, and lateral movement within the network. The presence of multiple RMM tools increases the attacker&rsquo;s resilience, making it harder to detect and remediate the intrusion. Affected systems can be used as a staging ground for further attacks, leading to significant financial and reputational damage. This can impact any Windows-based system, and the CISA advisory AA23-025A specifically highlights the risk of MSP infrastructure compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Multiple RMM Vendors on Same Host</code> to your SIEM and tune for your environment.</li>
<li>Investigate hosts triggering the rule to confirm legitimate use of multiple RMM tools. Check <code>Esql.vendors_seen</code> and <code>Esql.processes_name_values</code> for insight into the involved tools.</li>
<li>Review asset inventory and change tickets to verify authorized RMM software installations.</li>
<li>Isolate any unauthorized or unexplained hosts and remove unapproved RMM tools.</li>
<li>Enforce a single approved RMM stack per asset class where possible.</li>
<li>Enable Sysmon process creation logging (Event ID 1) on Windows endpoints to enhance detection capabilities as described in the rule&rsquo;s setup instructions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remote-access-tool</category><category>command-and-control</category><category>rmm</category><category>windows</category></item><item><title>Multiple Remote Management Tool Vendors on Same Host</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-multiple-rmm-vendors/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-multiple-rmm-vendors/</guid><description>This detection identifies a Windows host where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.</description><content:encoded><![CDATA[<p>This detection rule identifies Windows hosts running multiple remote monitoring and management (RMM) tools from different vendors within an eight-minute timeframe. While legitimate MSP environments may utilize multiple tools, this activity can also indicate malicious behavior, such as an attacker establishing redundant access to a compromised system. The rule maps various RMM processes to vendor labels, ensuring that multiple binaries from the same vendor do not inflate the count. The processes monitored include popular RMM tools like TeamViewer, AnyDesk, ScreenConnect, and many others. This rule is designed to detect suspicious activity within the environment and alert security teams to potential compromises. The timeframe is set to eight minutes to reduce false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows host, possibly through phishing or exploitation of a vulnerability.</li>
<li>Tool Deployment: The attacker deploys an initial RMM tool for remote access and control.</li>
<li>Secondary Tool Deployment: The attacker deploys a second RMM tool from a different vendor to ensure redundant access in case the first tool is detected or removed.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain SYSTEM or Administrator rights, if necessary, to maintain persistent access and control.</li>
<li>Lateral Movement: The attacker uses the RMM tools to move laterally within the network to access additional systems and data.</li>
<li>Data Exfiltration/Malicious Activity: The attacker uses the established RMM connections to exfiltrate sensitive data or perform other malicious activities such as deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive systems and data, potentially resulting in data breaches, financial loss, and reputational damage. This detection rule helps identify hosts that might be compromised by malicious actors utilizing multiple RMM tools for command and control. Identifying potentially compromised systems is key to preventing widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM to detect multiple RMM tools running on the same host within an eight-minute window.</li>
<li>Investigate systems triggering this alert by reviewing process execution logs and network connections to identify the source of the RMM tool installation.</li>
<li>Enforce a policy of a single approved RMM stack per asset class to minimize the risk of unauthorized RMM tool usage.</li>
<li>Tune the provided Sigma rules with host or organizational unit exceptions for legitimate MSP/IT tooling environments.</li>
<li>Review asset inventory and change tickets for approved RMM software to identify unauthorized installations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>rmm</category><category>windows</category><category>threat-detection</category></item></channel></rss>