SPEAK WITH AN EXPERT

Risks tied to SimpleHelp Remote  Monitoring & Management Exploitation 

Authors: Niranjan Jayanand, Venkatesh Bolla, Golan Agi

 

Executive Summary  

On January 13, 2025, Horizon AI disclosed three critical vulnerabilities that could compromise both SimpleHelp server and client machines. SimpleHelp quickly patched these vulnerabilities in January and urged organizations to quickly update to the latest versions. 

CyberProof Threat Hunters assess with medium confidence that different cybercriminal groups and some ransomware groups are likely abusing these vulnerabilities in the wild. Attacks so far reported and researched, are likely through connecting to endpoints running vulnerable versions of SimpleHelp Remote Monitoring & Management (RMM) Client. 

The CyberProof Threat Research Team details on how they tracked the vulnerability to study any potential abuse and shares a hunting query that can be used for the initial stage of hunting to help organizations check for post-exploitation events of SimpleHelp’s RMM software. 

Technical Details 

Since the COVID outbreak, attackers have progressively focused on RMM tools, exploiting the prevalence of the hybrid work model. In almost every attack, remote access software (RMM) may be installed and used post-compromise as an alternate communications channel for redundant access or as a way to establish an interactive remote desktop session with the target system.  

Attackers have increasingly targeted RMM tools, taking advantage of the widespread hybrid work model. Below are some of the top targeted RMM vulnerabilities in 2024. 

  • CVE-2024-12356 and CVE-2024-12686: Affecting BeyondTrust products. 
  • CVE-2024-12754: A privilege escalation vulnerability stemming from an arbitrary file read/copy operation performed by the AnyDesk service as NT AUTHORITY\SYSTEM. This flaw allows an attacker to manipulate the file-copying process to overwrite system-critical files while retaining original ownership and permissions. 

Early January, Horizon3 disclosed reporting SimpleHelp RMM vulnerabilities targeted CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728 that pose risks from attackers ranging from escalating privileges to downloading or uploading arbitrary files. 

The stats below, from Shadow Server, shows the prevalence of vulnerable versions of SimpleRMM globally. 

A treemap chart showing the United States leading with 345, followed by the United Kingdom with 70, Canada with 33, and the Netherlands with 27, among others.

Source: ShadowServer 

What to Look For

Different cyber-criminal groups including human-operated ransomware groups are well known to abuse inbuilt applications and trusted tools throughout different stages of the attack kill chain. Your Threat Hunting Team should look for context around the following events to distinguish the unknown from the known:

  • Check for lateral movements through WMI, PSExec, etc 
  • Check for reconnaissance through execution of ipconfig, net.exe, netstat.exe etc. 
  • Watch out for new user account creation. 
  • Check for post compromise tools dropped and executed – like Impacket, Sliver, Mimikatz, CobaltStrike, BloodHound, ngrok etc. 
  • Check for defense evasion techniques like disabling security services (example: Microsoft Defender), process injection in the context of benign processes, scanning across the environment for vulnerable drivers etc. 
  • Check for deployment and execution of malicious files to several endpoints through WMI, PDQDeployRunner etc. 
  • Check for data exfiltration through tools like RClone, RustDesk, etc. 

Hunting Query 

CyberProof Researchers have made available a hunting query that can be used for the initial assessment stage to help organizations check for post-exploitation events of SimpleHelp’s Remote Monitoring & Management (RMM) software.  The query below is only shared to help initiate a review of possible suspicious child processes launched from the RMM process.

A list of executable filenames and event query code is displayed, highlighting process monitoring and detection in a network security context. This includes elements of Remote Monitoring to enhance vigilant oversight.

Our teams have tested SimpleHelp RMM vulnerability against the query for the post compromise TTP (Hands-on keyboard commands execution). Please see the results below:

Screenshot of a security event log highlighting process creation and access details with red arrows, accompanied by an event entities graph on the right, showcasing potential Management Exploitation. Ideal for those utilizing Remote Monitoring or SimpleHelp services to boost security awareness.

 

A computer screen displays code and a data table. The top section features a SQL query, while the bottom reveals a detailed activity log, ideal for management exploitation. Columns include date, device name, action type, and filename.

Recommendation 

  1. SimpleHelp strongly advises users to update to the latest version as recommended in their advisory for Security Vulnerabilities in SimpleHelp 5.5.7 and earlier:  
  • SimpleHelp v5.5 Users – SimpleHelp v5.5.8 and later versions resolve these vulnerabilities. The latest release is available on the SimpleHelp Download Page
  • SimpleHelp v5.4 Users – A patch for SimpleHelp v5.4.10 is now available.
  • SimpleHelp v5.3 Users – A patch for SimpleHelp v5.3.9 is now available.
  • Uninstall unused and unauthorized SimpleHelp RMM instances from the network. 
  • Restrict the use of SimpleHelp or any RMM with the network to admins and authorized users only. 
  1. Work closely with threat intelligence and detection engineering teams to enrich hunting queries to stay ahead of early-stage targeted and opportunistic attacks. 

How CyberProof Can Help 

As cyber threats continue to evolve, so too must the strategies and technologies used to combat them. Threat detection is a critical component of any organization’s cybersecurity strategy. Learn how CyberProof can help your organization effectively detect and respond to cyber threats