SPEAK WITH AN EXPERT

ConnectWise ScreenConnect Attacks (Part 2): IRS Themed Attacks

This blog is part of a (2) part series around our research finding on the ConnectWise ScreenConnect Attacks.
You can catch up on our initial findings here – ConnectWise ScreenConnect Attacks (Part 1): Continued Surge in RMM Tool Abuse.

In our previous blog on the ConnectWise ScreenConnect Attacks and in a recent public research, it was highlighted that attackers in recent days, targeted users through Microsoft Authenticode stuffing, that allows for the insertion of data into a certificate table while keeping the digital signature intact. By this technique, an attacker can build a ScreenConnect installer configured saved within file’s authenticode signature to include a remote server the client should connect to, what text is shown in the dialog boxes, and logos that should be displayed.

Earlier research noted that malicious ScreenConnect droppers employed revoked certificates. However, the certificates found in these current attack samples were active when this report was written.

Technical Details

First, CyberProof researchers spotted a phishing email impersonating the Internal Revenue Service (IRS) tax notice using the email address: eloosli@precisegrind.com, targeting a retail customer:

Screenshot of an IRS tax notice email instructing the recipient to view their notice, respond promptly, or contact a tax professional, featuring a blue "View Your Notice" button in a connectwise screenconnect remote session.

Then we observed that upon clicking on the hyperlink highlighted in β€œView Your Notice” as highlighted above, the user is taken to a phishing page [ hosted in doc-irs.us ] impersonating IRS website.

When the user clicks on IRS Statement.pdf, a malicious ScreenConnect installer is served to endpoint:

A web page titled

Analyzed samples were programmed to connect to the attacker server using .top TLD.

A screenshot shows command lines with paths to executables and a URL containing parameters like e=Access&s=Guest&grp=0&f=xp, indicating usage of ConnectWise ScreenConnect for remote access.

Finally, reviewing additional third-party data sources, confirmed this IRS phishing campaign serving the malicious ScreenConnect installer has been making rounds for about three months, as of the publication of this research.

Hunting Query

The hunting query previously provided is still applicable:

A query filtering DeviceEvents for connectwise screenconnect, specific domain patterns, and command lines containing

The samples we analyzed did not have their signatures revoked at the time of writing this report:

Screenshot of a digital signature details page, similar to those in ConnectWise ScreenConnect, showing file version info, signers, counter signers, and X509 certificates for

Indicator of Compromise

  • limpilimpieza[.]net/z
  • 141.11.164.2
  • doc-irs.us
  • 11541d1b1d5b6af6acaf2ae2c4b713ad
  • c9a52422f5883cf813e1863122223a15

References

https://www.cyberproof.com/blog/connectwise-screenconnect-attacks-continued-surge-in-rmm-tool-abuse

https://www.gdatasoftware.com/blog/2025/06/38218-connectwise-abuse-malware