Comprehensive Threat Exposure Management Platform
Remote Monitoring and Management (RMM) tools LogMeIn Resolve and PDQ Connect are being weaponized by threat actors to deploy PatoRAT malware through sophisticated supply chain attacks targeting organizations in Korea. This November 2025 threat campaign exploits legitimate RMM software capabilities, transforming trusted IT management tools into backdoor gateways for cybercriminals. Attackers distribute trojanized versions of popular utilities like Notepad++ and 7-Zip through fake download sites, secretly installing manipulated RMM tools that provide persistent remote access. The PatoRAT backdoor enables complete system compromise, including data theft, command execution, and credential harvesting. Organizations must immediately verify their RMM tool installations and enhance endpoint security to detect these living-off-the-land attacks.
Recent cyberattacks have increasingly weaponized Remote Monitoring and Management tools, specifically targeting LogMeIn Resolve (GoTo Resolve) and PDQ Connect for malicious purposes. Threat actors distribute malware through fake websites mimicking legitimate software downloads, where unsuspecting users download trojanized versions of utilities like Notepad++ or 7-Zip bundled with compromised RMM tools. The attackers rebrand LogMeIn under multiple misleading names to evade detection while maintaining backdoor access.
LogMeIn Resolve, a trusted RMM platform for remote support and endpoint monitoring, becomes a perfect attack vector due to its legitimate capabilities that bypass traditional security controls. Security researchers discovered internal configuration files exposing three unique “CompanyId” values linked to attackers, indicating coordinated misuse across multiple campaigns. Once the trojanized LogMeIn instance installs, it automatically registers within LogMeIn’s infrastructure, granting threat actors remote access to execute PowerShell commands and deploy PatoRAT malware without triggering security alerts.
Both PDQ Connect and LogMeIn Resolve serve as delivery mechanisms for PatoRAT, a sophisticated Delphi-based backdoor enabling remote control and data exfiltration. PDQ Connect’s extensive device management features, including software deployment and remote administration capabilities, allow attackers to execute arbitrary commands silently. The PatoRAT malware contains Portuguese-language log messages and stores its configuration in XOR-encrypted blocks using simple 0xAA keys, revealing command-and-control addresses, mutex values, and operational flags upon decryption.
PatoRAT establishes persistent backdoor access by sending initial system information to command-and-control servers before awaiting further instructions. This remote access trojan enables attackers to execute commands, exfiltrate sensitive data, deploy additional payloads, capture keystrokes, steal browser credentials, and maintain long-term persistence. The malware’s simple encryption and use of legitimate RMM platforms make detection extremely challenging for traditional antivirus solutions.
Download Software Only From Official Sources: Verify all software downloads come from official vendor websites or trusted app stores. Avoid downloading applications from pop-ups, advertisements, or unfamiliar sites even if they appear legitimate. Double-check URLs and digital certificates before installation.
Verify Installation Packages: Before running any installer, examine file names, version numbers, and digital certificates carefully. Suspicious indicators include unexpected names, missing signatures, or unusual file properties that don’t match official releases.
Exercise Caution With Free Utility Downloads: Attackers frequently disguise malware as popular free tools including Notepad++, 7-Zip, and other utilities. Always download these applications directly from their official websites rather than third-party sources.
Maintain Updated Security Systems: Regular updates patch security vulnerabilities and provide antivirus solutions with latest threat definitions. Enable automatic updates wherever possible to ensure continuous protection against emerging threats.
Deploy Advanced Endpoint Protection: Implement next-generation antivirus (NGAV) and endpoint detection & response (EDR) solutions to identify suspicious RMM tool behavior. Leverage behavioral analysis and machine learning-based detection to spot malicious activity patterns.
MD5 Hashes:
SHA256 Hashes:
Command-and-Control Domains:
Malicious Download URLs (defanged):
Execution (TA0002):
Defense Evasion (TA0005):
Credential Access (TA0006):
Discovery (TA0007):
Collection (TA0009):
Command and Control (TA0011):
Get through updates and upcoming events, and more directly in your inbox