<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(cofense.com) Legitimate Tools as Weapons: How Threat Actors Abuse RATs and CVEs to Evade Detection]]></title><description><![CDATA[<p>(cofense.com) Legitimate Tools as Weapons: How Threat Actors Abuse RATs and CVEs to Evade Detection</p><p>Threat actors increasingly abuse legitimate Remote Access Tools (RATs) to evade detection and deliver payloads. NetSupport Manager, ConnectWise ScreenConnect, FleetDeck, and Atera dominate, comprising 87% of observed abuse.</p><p>In brief - Legitimate RATs like NetSupport (40%) and ConnectWise (34%) are exploited for persistence, lateral movement, and data exfiltration. Microsoft’s 2022 macro restrictions reduced Office-based attacks, shifting focus to RATs. Organizations must monitor trusted software and patch critical CVEs.</p><p>Technically - Exploited CVEs include CVE-2017-11882 (Equation Editor RCE), CVE-2017-0199 (Windows API RCE), CVE-2018-0798, and CVE-2018-0806. RATs enable keylogging, screen capture, and secondary malware deployment. ConnectWise (formerly Parcel RAT) surged post-March 2024, while Atera’s cross-platform support complicates EDR detection. Macro-based delivery declined post-June 2022, but RAT abuse persists as a primary intrusion vector.</p><p>Source: <a href="https://cofense.com/blog/weaponizing-apathy-how-threat-actors-exploit-vulnerabilities-and-legitimate-software" rel="nofollow noopener"><span>https://</span><span>cofense.com/blog/weaponizing-a</span><span>pathy-how-threat-actors-exploit-vulnerabilities-and-legitimate-software</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/164cd52c-d67c-436c-957b-211e403e406d/cofense.com-legitimate-tools-as-weapons-how-threat-actors-abuse-rats-and-cves-to-evade-detection</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 07:51:22 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/164cd52c-d67c-436c-957b-211e403e406d.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 22 Apr 2026 13:56:42 GMT</pubDate><ttl>60</ttl></channel></rss>