The Skeleton Key: How Attackers Weaponize Trusted RMM Tools for Backdoor Access

KnowBe4 Threat Lab | Jan 22, 2026

KnowBe4-Threat-Lab-LogoLead Analysts: Jeewan Singh Jalal, Prabhakaran Ravichandhiran and Anand Bodke

KnowBe4 Threat Labs recently examined a sophisticated dual-vector campaign that demonstrates the real-world exploitation chain following credential compromise. This is not a traditional virus attack. Instead of deploying custom viruses, attackers are bypassing security perimeters by weaponizing the necessary IT tools that administrators trust. By stealing a “skeleton key” to the system, they turn legitimate Remote Monitoring and Management (RMM) software into a persistent backdoor. 

Phishing Attack Summary
  • Vector and Type: Email Phishing / Dual-vector attack that moves from credential harvesting to full system takeover
  • Techniques: brand impersonation, credential harvesting, RMM deployment
  • Bypassed SEG detection: Yes
  • Targets: Organizations globally
The Two-Wave Attack Strategy

This campaign operates in two distinct waves: first by harvesting credentials through fake invitation notifications, then weaponizing those credentials to deploy legitimate RMM software that establishes persistent backdoor access to victim systems. 

Wave 1: Credential Harvesting

The attack begins with a phishing email disguised as a Greenvelope invitation. Because Greenvelope is a legitimate service used for corporate events and weddings, the “Social Engineering Indicators” are subtle. Victims who click the invitation are directed to a highly convincing spoofed login page designed to capture their credentials. 

Example of a fake GreenVelope invitation phishing email used to harvest victim credentials in Wave 1 of the attack.


Example of an original GreenVelope login page compared to the spoofed login page.

Grid of four phishing landing pages, each designed to harvest user credentials by impersonating well-known email and technology service providers.

The success of Wave 1, the theft of valid credentials, is not the ultimate end goal; it is the enabling step for the highly-advanced Wave 2 of this attack strategy.

Wave 2: RMM Development

For the attacker, a valid password is not the end goal—it is the delivery mechanism. Once credentials are secured, the threat actors generate legitimate RMM access tokens. These tokens are then deployed in follow-on attacks through a file called “GreenVelopeCard.exe” to establish persistent remote access to victim systems. 

How the Attack Works

Complete attack flow showing the two-wave progression from credential theft to RMM deployment and persistent access.


Delivery Method:
Fake GreenVelope Invitation Emails
Initial Payload: GreenVelopeCard.exe
Legitimate Signer: GoTo Technologies USA, LLC
RMM Tools Deployed: GoTo Resolve, LogMeIn
Threat Level: CRITICAL - Persistent remote access with credential dumping capabilities

The use of legitimately signed software from a trusted vendor allows the malware to bypass many security solutions that rely on signature-based detection. 

Technical Analysis

The GreenVelopeCard.exe file serves as the primary orchestrator. Analysis has revealed that it contains a JSON configuration file with seven critical command line arguments that configure the RMM installation:

  1. Company ID: Links to an attacker-controlled GoTo Resolve company account 
  2. Installation ID: Registered with the attacker’s GoTo Resolve account
  3. WorkFolder: Uses the Company ID as a folder name for organization
  4. Environment: Connects to production servers: 
    • console[.]gotoresolve[.]com,
    • Devices-iot[.]console[.]gotoresolve[.]com
  5. Application Type: Enables unattended operation with full capabilities (it runs without user interaction, operates silently in the background, and provides remote control)
  6. Language: Logs written in English
  7. Website URL: Primary Command and Control (C2) endpoint for the RMM installation
    • Main Domain: console[.]gotoresolve[.]com (official GoTo Resolve infrastructure)
    • Subdomain: devices-iot (IoT/device management console)


Seven command line arguments extracted from GreenVelopeCard.exe showing attacker-controlled configuration parameters.


JSON configuration file embedded within the GreenVelopeCard.exe file dropper.

In essence, this JSON file acts as the attacker’s pre-programmed deployment script. It can tell the legitimate GoTo Resolve application to install itself silently, connect to the attacker’s private network, and run with full, remote control capabilities. This all happens without the victim or most security systems ever realizing a legitimate tool is being criminally weaponized. 

Privilege Escalation: Gaining the “Master Key”

Once the RMM tool is on the system, the attackers move to secure SYSTEM-level privileges. This is the difference between having a key to a single room and having the master key to the entire building. 

  1. Registry Manipulation: The attackers alter Windows service settings for GoTo Resolve, forcing it to run with unrestricted access to system resources.
  2. COM API Backdoors: The campaign establishes hidden scheduled tasks via the Windows COM API. These tasks ensure the RMM tool restarts even if a user manually kills the process. 
  3. Service Abuse: By using the Windows Service Control Manager (services.exe) to launch components, the malware inherits the trust of the operating system.
Network Communication: Hiding in Plain Sight

The most effective part of this campaign is its “Command and Control” (C2) strategy. By using official production infrastructure, the malicious traffic is nearly indistinguishable from everyday business operations. 

Endpoint

Evasion Strategy

dumpster.console.gotoresolve.com

Uses encrypted HTTPS on GoTo’s official production servers.

dumpster.dev01-console.gotoresolve.com

A secondary "development" channel used for redundancy.

settings.cc

A fallback domain used to deliver updated configuration scripts.


Turning Intelligence into Action

In the face of rapidly evolving tactics, security teams can no longer afford a “wait and see” approach to user education. Organizations must move quickly to counter these sophisticated threats. Human Risk Management (HRM) provides the framework to do this by dismantling the traditional silos between threat research and user awareness.

A HRM platform continuously synthesizes behavioral data, product telemetry, and real-time threat intelligence to generate highly accurate risk scores for each individual user. This data-driven approach allows for the platform to automate technical controls and hyper-personalized training to intervene and coach users when they need it most.

The most effective way to build this defense is by transforming real phishing attacks—like the “Greenvelope” attack—into de-fanged phishing simulations. This will provide highly accurate training that will equip users to identify and report sophisticated threats in real-time. 

Defensive Measures: Strengthening Your Perimeter

To mitigate the risk of RMM-based attacks, security teams should prioritize the following immediate actions: 

  • Hunt for provided Indicators of Compromise (IOCs) in your environment
  • Block identified C2 domains at the network perimeter
  • Monitor for unauthorized RMM installations and usage patterns
Indicators of Compromise (IOCs)

The threat landscape evolves rapidly. For the most current list of domains, hashes, and behavioral signatures related to this campaign, please refer to the latest intelligence update from KnowBe4 Threat Labs.

View the full IOC list on X:

https://x.com/Kb4Threatlabs/status/1996210706258313663?s=20

For real-time updates and ongoing threat intelligence, follow the KnowBe4 Threat Lab analysts on X: @Kb4Threatlabs


See how KnowBe4 can protect you from inbound and outbound email threats, and automate your training.

ESC_HRM_URS_illustration_kb4Request your personalized demo to see how our technology:

  • Defends against advanced phishing attacks that other products miss
  • Prevents misdirected emails or files
  • Use live threat intelligence and behavioral analytics to automate personalized KnowBe4 training
  • Continuously assesses human risk and dynamically adapts policy controls
  • Enforces information barriers to meet compliance requirements
  • Stops unauthorized data exfiltration
  • Protects sensitive data without introducing friction

It’s simple. Together we are stronger.

Request a Demo

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/products/cloud-email-security/demo



Subscribe to Our Blog


Gartner Magic Quadrant




Get the latest insights, trends and security news. Subscribe to CyberheistNews.