<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Remote Desktop Protocol — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/remote-desktop-protocol/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 20:54:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/remote-desktop-protocol/feed.xml" rel="self" type="application/rss+xml"/><item><title>Ransomware-as-a-Service (RaaS) Ecosystem: Affiliate Tradecraft and Initial Access Vectors</title><link>https://feed.craftedsignal.io/briefs/2026-05-raas-ecosystem/</link><pubDate>Wed, 20 May 2026 20:54:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-raas-ecosystem/</guid><description>Ransomware-as-a-service (RaaS) attacks leverage affiliates for initial access, persistence, and exfiltration, using varied techniques like compromised RDP, vulnerable VPNs, and rogue RMM tools, impacting multiple organizations in a single campaign.</description><content:encoded><![CDATA[<p>Ransomware-as-a-service (RaaS) has become a prevalent model where ransomware operators manage the ransomware variant and infrastructure, while affiliates handle the intrusion, data theft, and deployment of the encryptor. This division of labor means that the ransomware family name does not reliably explain the intrusion&rsquo;s origin or the actions taken by the attacker within the victim&rsquo;s environment. Different affiliates employ diverse techniques for initial access, ranging from social engineering to exploiting exposed remote access services and leveraging pre-existing footholds acquired from initial access brokers (IABs). Notably, threat actors are increasingly abusing legitimate tools and pathways to blend in with normal activity. For instance, in 2025, threat actors targeted SonicWall VPNs before deploying Akira ransomware. The affiliate, and not the ransomware operator, often dictates the tradecraft, necessitating a broad defense strategy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access via RDP:</strong> Threat actors gain initial access by exploiting weak or compromised Remote Desktop Protocol (RDP) credentials, enabling RDP via SMB protocol, or through Microsoft SQL Server (MSSQL).</li>
<li><strong>Exploitation of Vulnerable Edge Appliances:</strong> Attackers target vulnerable edge appliances, such as SonicWall VPNs, to gain network access, as observed in Akira ransomware deployments in 2025.</li>
<li><strong>Compromise of RMM Tools:</strong> Rogue Remote Monitoring and Management (RMM) tools like ScreenConnect, TeamViewer, or Bomgar are compromised, providing a foothold in the victim&rsquo;s environment.</li>
<li><strong>Persistence through New User Creation:</strong> Threat actors create new user accounts on the compromised systems to ensure persistent access.</li>
<li><strong>Account Hiding:</strong> Attackers hide newly created user accounts from the Welcome Screen visible via Terminal Services/RDP to evade detection.</li>
<li><strong>Installation of Remote Access Tools:</strong> Additional RMM tools like Chrome Remote Desktop and AnyDesk are installed post-compromise to retain remote access to the system.</li>
<li><strong>Defense Evasion:</strong> Threat actors attempt to evade detection by configuring Defender exclusions or employing more aggressive tactics like EDR and AV killers.</li>
<li><strong>Data Exfiltration:</strong> Data is staged by consolidating and compressing it into encrypted archives using tools like 7-Zip before exfiltration from the compromised network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>RaaS attacks can lead to significant operational disruptions, data breaches, and financial losses for victim organizations. The exploitation of legitimate tools and pathways makes detection challenging, allowing attackers to move laterally within the network and exfiltrate sensitive data. In MSP-centric environments, a single compromised RMM instance can provide access to numerous downstream victims, as seen in the April 2026 incident involving a dental software company, impacting dozens of organizations. Successful ransomware deployment results in encrypted files, demanding ransom payments for decryption keys and potentially leading to data leaks if the ransom is not paid.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for suspicious RMM tool usage, such as <code>ScreenConnect.exe</code> or <code>TeamViewer.exe</code> launching from unusual locations or with unusual command-line arguments, using the &ldquo;Detect Suspicious RMM Tool Execution&rdquo; Sigma rule.</li>
<li>Implement network connection monitoring to detect RDP connections originating from unexpected sources or using non-standard ports to identify potential RDP compromise (T1021.001).</li>
<li>Enable and review Windows Security Event Logs for Event ID 4720 (A user account was created) to detect unauthorized user account creation, a common persistence technique (T1547.001).</li>
<li>Implement host-based intrusion detection systems (HIDS) to detect unusual file compression activity using <code>7-Zip</code>, indicative of data staging for exfiltration.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>ransomware</category><category>raas</category><category>initial-access</category><category>persistence</category></item></channel></rss>