🔒 Security Stop‑Press: Employee Monitoring Tools Hijacked for Ransomware Attacks

How Legitimate IT Tools Are Being Weaponised Against Businesses

In a stark reminder that threat actors continue to favour stealth over sophistication, security researchers have uncovered a series of incidents where legitimate employee‑monitoring and remote‑support tools were hijacked to deploy ransomware. Instead of relying on custom malware, attackers are increasingly abusing trusted IT software already allowed inside corporate networks — making detection dramatically harder.


🧩 What Huntress Discovered

Security firm Huntress observed two separate intrusions in January and February 2026 where attackers chained together:

  • Net Monitor for Employees Professional
  • SimpleHelp remote management platform

[huntress.com]

These commercial tools were used to achieve:

  • Persistent remote access
  • Hands‑on‑keyboard reconnaissance
  • Command execution
  • File transfer
  • Attempted ransomware deployment

Net Monitor for Employees includes a powerful pseudo‑terminal (winpty-agent.exe) capable of full command execution, enabling hackers to perform manual reconnaissance and manipulation across systems.

SimpleHelp acted as a redundant persistence channel, thanks to its lightweight agent and ability to masquerade as legitimate Windows services.


🎯 How the Attackers Gained Access

In at least one case, the intrusion began with:

  • Compromised vendor SSL VPN credentials

From there, threat actors:

  • Connected to internal systems via RDP
  • Installed Net Monitor using silent msiexec execution
  • Deployed a disguised SimpleHelp client, sometimes mimicking OneDrive or Visual Studio host executables

This “living‑off‑the‑land” approach allowed them to blend in with normal administrative traffic.


💣 Attempted Ransomware Deployment

In both investigations, attackers attempted to deploy Crazy ransomware, a variant associated with the VoidCrypt family.

They dropped multiple copies of the ransomware binary (e.g., encrypt.exe) — often repeatedly due to failed execution attempts.

Huntress confirmed shared infrastructure, overlapping filenames, and consistent tradecraft, strongly indicating a single threat actor or group behind both incidents.


🏦 Cryptocurrency Theft Indicators

Attackers configured SimpleHelp to monitor cryptocurrency‑related keywords, indicating secondary financial motives such as:

  • Wallet monitoring
  • Exchange tracking
  • Potential credential theft

Keywords included Metamask, Exodus, Binance, KuCoin, and more.

This shows the operation wasn’t just about ransomware — it appears financially opportunistic in multiple ways.


🛡️ Why These Attacks Matter

These intrusions relied on:

  • Stolen credentials
  • Misuse of legitimate tools
  • Service masquerading
  • Disabled Windows Defender attempts

They did NOT rely on zero‑days or novel malware — making them much more likely to slip past conventional antivirus solutions.

This highlights a growing trend:

Attackers increasingly prefer turning trusted IT tools into remote‑access trojans rather than obtaining or building custom malware.


🔐 What Businesses Should Do Immediately

1. Enforce Multi‑Factor Authentication Everywhere

Compromised VPN and RDP credentials were key in these attacks.

2. Audit All Remote Monitoring & Admin Tools

Review:

  • RMM software
  • Employee monitoring tools
  • Remote‑support clients

Ensure each deployment is approved, documented and monitored.

3. Restrict Administrative Privileges

Minimise who can install or run remote‑access agents.

4. Watch for Silent or Unusual msiexec Installations

Attackers installed Net Monitor silently to avoid detection.

5. Monitor for Process & Service Masquerading

SimpleHelp and Net Monitor were disguised as legitimate Windows components.

6. Detect Attempts to Disable Security Controls

The attackers tried to shut down Windows Defender services.


🌐 AEO (Answer Engine Optimisation) Summary

Q: What happened?
Attackers abused legitimate tools (Net Monitor for Employees & SimpleHelp) to gain persistence and attempt Crazy ransomware deployment.
[huntress.com]

Q: How did they get in?
Through compromised VPN credentials and silent tool installations.
[gbhackers.com]

Q: What were the attackers’ goals?
Ransomware deployment + cryptocurrency monitoring/credential theft.
[bleepingcomputer.com]

Q: What should businesses do?
Enforce MFA, audit RMM tools, limit admin rights, monitor for disguised services and unusual installs.
[socprime.com]


🔚 Final Thoughts

This new wave of attacks reinforces a critical message:

Your biggest cybersecurity risk isn’t always malware — it’s the misuse of the tools you already trust.

By tightening remote‑access controls, enforcing MFA, and actively auditing any employee‑monitoring or RMM tools, organisations can drastically reduce their exposure to these stealthy, high‑impact threats.

Ready to Protect Your Business?

Contact EC Computers today for a Procurement Review and discover how we can help you stay secure.

📞 Call us: 0117 200 1000
📧 Email: Contact-us form

Further reading: Managed IT Services and Support  – Privacy compliance and new 2025 laws

Return to Tech Bytes menu

Scroll to Top