ScreenConnect Flaws Exploited in Network Breaches

▼ Summary
– Cybersecurity researchers have observed increased cyber-attacks using RMM tools like AnyDesk, ConnectWise ScreenConnect, and Atera for initial access through phishing.
– Attackers are shifting from AnyDesk to ScreenConnect, exploiting its legitimate features such as unattended access and VPN functionality to maintain persistence and move laterally in networks.
– ScreenConnect’s in-memory installation leaves minimal disk traces and evades basic antivirus scans, while attackers use custom URLs from its management console for phishing.
– Key indicators for defenders include monitoring custom URLs, in-memory behavior, persistent client binaries, configuration files, and specific event logs like Security Event ID 4573.
– The flexibility and broad system access that make ScreenConnect effective for IT administrators also make it appealing to attackers, requiring careful detection for effective DFIR and threat hunting.
A significant surge in cyber-attacks is underway, with malicious actors increasingly leveraging legitimate remote monitoring and management (RMM) tools as a primary method for gaining initial access to networks through sophisticated phishing schemes. Security researchers have documented this troubling trend, noting that these tools provide a stealthy and effective entry point for unauthorized system control.
Recent analysis from the DarkAtlas research initiative reveals that advanced persistent threat (APT) groups are actively exploiting widely-used RMM platforms. Among the software being abused are AnyDesk, ConnectWise ScreenConnect, and Atera. While security improvements have made AnyDesk easier for defenders to identify, causing many attackers to abandon it, ConnectWise ScreenConnect has become notably more popular among cybercriminals seeking reliable remote access.
ScreenConnect, developed by ConnectWise, is an authentic IT administration tool. Its purpose is to allow support technicians to deploy tasks, manage numerous devices, and offer remote assistance across a diverse range of operating systems, including Windows, macOS, Linux, iOS, and Android. Unfortunately, threat actors are now manipulating the platform’s legitimate capabilities. They are exploiting features like unattended access, built-in VPN functionality, REST API integration, and file transfer services to establish a lasting presence inside victim networks and move laterally to other systems.
How ScreenConnect is Being Weaponized
The installation process for the ScreenConnect client is particularly concerning from a security perspective. The software runs predominantly in system memory, which means it leaves minimal traces on the hard drive. This characteristic allows it to easily bypass basic antivirus scans that focus on file-based detection.
Attackers cleverly misuse the platform’s own management console to create custom URLs or invitation links. These features were originally designed to simplify legitimate remote support sessions. However, adversaries now embed these links into phishing emails and messages, tricking recipients into installing a malicious, attacker-controlled version of the ScreenConnect client.
Once a victim executes the installer, the client binary, typically named ScreenConnect.WindowsClient.exe, registers itself as a Windows service. This provides the attacker with persistent remote connectivity that survives system reboots. Forensic investigators have also discovered that local configuration files, such as user.config and system.config, store critical data. This includes hostnames, IP address mappings, and encrypted keys that can be used to trace connections back to suspicious attacker-controlled domains.
Defensive Measures and Detection Strategies
The DarkAtlas research has pinpointed several key event logs that ScreenConnect generates during its operation. Security teams should pay close attention to Security Event ID 4573 and Application Log events with IDs 100 and 101. These logs offer invaluable forensic evidence for incident response and threat hunting units.
An interesting forensic challenge is that chat communications between the attacker and the victim are not saved to the disk. Instead, this data resides solely in volatile memory, making memory capture an essential step during any investigation involving these tools.
The very attributes that make ScreenConnect a powerful and flexible tool for system administrators, its extensive system access and adaptability, are the same qualities that attract malicious actors. To defend against these incursions, security professionals must vigilantly monitor for several key indicators.
These include the appearance of unexpected custom URLs and invitation links, the detection of in-memory installer activity, the presence of persistent client service binaries, and the creation of related configuration files. Correlating this information with the specific event IDs mentioned provides a stronger defensive posture.
Ultimately, recognizing and identifying the subtle signs of ScreenConnect misuse is fundamental to successful digital forensics, incident response, and proactive threat hunting operations. A deep understanding of how this legitimate tool can be twisted for malicious purposes is now a necessary component of modern cybersecurity defense.
(Source: Info Security)


