[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fIMGcI69sVQSaCB_CNSVzYIo9FiUaIQkk3R4MZIS1gQc":3},{"article":4,"iocs":41},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":21,"category":22,"article_tags":25},"5d2e0931-015f-4f57-a78c-0fd9b6156739","RMM Tools Fuel Stealthy Phishing Campaign","rmm-tools-fuel-stealthy-phishing-campaign-398088","Attackers are abusing two remote monitoring and management (RMM) tools to evade detection in a campaign that has impacted over 80 organizations so far.","A phishing campaign is leveraging compromised or abused remote monitoring and management (RMM) tools to evade detection and maintain persistence across over 80 organizations. Attackers are exploiting the trust inherent in legitimate RMM platforms to deliver malicious payloads and steal credentials. The campaign highlights how legitimate administration tools are increasingly weaponized to bypass traditional security controls.","Attackers abuse RMM tools to conduct stealthy phishing campaign against 80+ organizations.",null,"https:\u002F\u002Fwww.darkreading.com\u002Fcyberattacks-data-breaches\u002Frmm-tools-stealthy-phishing-campaign","https:\u002F\u002Feu-images.contentstack.com\u002Fv3\u002Fassets\u002Fblt6d90778a997de1cd\u002Fbltf46275f28f98b091\u002F69f8f7d214132e1bc74be18d\u002Frmm_Digitala_World_shutterstock.jpg?width=1280&auto=webp&quality=80&disable=upscale","2026-05-04T20:56:34+00:00","2026-05-04T22:00:24.560284+00:00",7,[18],{"name":19,"type":20},"Remote Monitoring and Management (RMM) tools","technology","89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5",{"id":21,"icon":11,"name":23,"slug":24},"Malware","malware",[26,31,36],{"category":27},{"id":28,"icon":11,"name":29,"slug":30},"26b0b636-0e31-4db1-bffb-61bdf9f20a58","Supply Chain","supply-chain",{"category":32},{"id":33,"icon":11,"name":34,"slug":35},"2c8f44d4-b56e-47cf-9677-04f22c9ee78d","Identity & Access","identity-access",{"category":37},{"id":38,"icon":11,"name":39,"slug":40},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]