Signed malware impersonating workplace apps deploys RMM backdoors

Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise environments. Organizations must harden certificate controls and monitor RMM activity to reduce exposure.

The post Signed malware impersonating workplace apps deploys RMM backdoors appeared first on Microsoft Security Blog.

This article has been indexed from Microsoft Security Blog

Read the original article: