NSA and partners release guidance on securing RMM

On January 25, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) released the “Protecting Against Malicious Use of Remote Monitoring and Management Software” Cybersecurity Advisory (CSA) to help network defenders protect against the malicious use of legitimate remote monitoring and management (RMM) software.

RMM software is commonly used by managed service providers (MSPs) and help desks to provide security and/or technical support. The software is intended to enable network management, endpoint monitoring, and remote interaction with hosts for IT-support functions. Malicious use of RMM software allows cybercriminals and advanced persistent threat (APT) actors to bypass anti-virus/anti-malware defenses.

In October, CISA identified a widespread cyber campaign in which cybercriminal actors leveraged RMM software to gain command and control of devices and accounts. Malicious cyber actors could leverage these same techniques to target National Security Systems (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) networks and use legitimate RMM software on both work and home devices and accounts. Other RMM software solutions could be abused to similar effect.

CISA, NSA, and MS-ISAC encourage network defenders to apply mitigations such as the following:

  • Audit installed remote access tools to identify RMM software.
  • Implement application controls to prevent execution of unauthorized RMM software.
  • Use only authorized RMM software on your network over approved remote access solutions, such as VPN or VDI.
  • Block both inbound and outbound connections on common RMM ports and protocols.

Read the full report here.

Source: NSA

Start 2023 ahead of the competition with a paid subscription to IC News. You’ll get full access to our searchable archive of 10,000+ articles, plus new articles each weekday.