Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (huntress.com) Threat Actors Exploit Tiflux RMM in Phishing Campaigns for Stealthy Persistence and Privilege Escalation

(huntress.com) Threat Actors Exploit Tiflux RMM in Phishing Campaigns for Stealthy Persistence and Privilege Escalation

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (huntress.com) Threat Actors Exploit Tiflux RMM in Phishing Campaigns for Stealthy Persistence and Privilege Escalation

    Threat actors are actively exploiting Tiflux, a commercial RMM tool, in phishing campaigns for initial access and persistence since late February. The campaign chains Tiflux with UltraVNC, Splashtop, and ScreenConnect for covert operations.

    In brief - Huntress researchers identified a surge in incidents involving Tiflux RMM abuse via phishing. The installer includes vulnerable components like HwRwDrv.sys, enabling privilege escalation and system compromise. Organizations must monitor RMM tool usage to prevent unauthorized access.

    Technically - The attack begins with a phishing email leading to a CloudFlare CAPTCHA-protected page delivering a malicious MSI installer. The installer deploys TiAgent, TiPeerToPeer, and outdated UltraVNC (v1.2.0.1) with hardcoded credentials. Vulnerable drivers (HwRwDrv.sys) and registry modifications disable security notifications, while additional RMM tools (Splashtop, ScreenConnect) facilitate credential theft and system profiling. Expired certificates and SSH host keys further indicate malicious intent.

    Source: https://www.huntress.com/blog/tiflux-rmm-install

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups