Cybercriminals seize on MSP tools to harvest personal data

By Cybersol·March 13, 2026·6 min read
SourceOriginally from Cybercriminals seize on MSP tools to harvest personal dataView original

MSP Tool Compromise as Systemic Vendor Risk: The 277% RMM Exploitation Surge and Its Governance Implications

Why This Matters at Board and Regulatory Level

The weaponization of remote monitoring and management (RMM) platforms represents a fundamental shift in how supply chain compromise operates. When threat actors exploit tools like ConnectWise ScreenConnect, NetSupport, and Atera—deployed across dozens or hundreds of client environments simultaneously—a single platform compromise becomes a multi-victim incident with cascading liability, regulatory exposure, and notification complexity. This is not a tool vulnerability in isolation; it is a governance failure at the intersection of vendor selection, contractual risk allocation, and incident response architecture. For boards and compliance officers, the 277% year-over-year increase in RMM exploitation documented in Huntress's 2026 Cyber Threat Report signals that traditional vendor risk assessment frameworks are structurally inadequate.

The Scale of the Problem: RMM Abuse Now Dominates Incident Patterns

According to research by Huntress across 230,000+ customer environments, RMM exploitation accounted for 25% of observed cyber incidents in 2025, up from 7% in 2024. This is not marginal growth; it represents a fundamental reordering of threat vectors. Threat actors have deliberately shifted away from traditional malware and remote access trojans toward "living off the land"—leveraging industry-standard tools that are already trusted, whitelisted, and integrated into organizational infrastructure. The healthcare and technology sectors experienced the most acute surge, but the pattern is spreading across all verticals. What makes this particularly dangerous is the targeting specificity: ConnectWise ScreenConnect is favored for campaign orchestration and personal data harvesting; NetSupport and PDQ Connect are used for payload delivery and staging; Atera and AnyDesk are weaponized for ransomware execution. More than half of suspicious Atera instances involved ransomware operations. This is not random exploitation—it is systematic, tool-specific, and optimized for maximum lateral movement and data exfiltration.

The Trust Asymmetry: Why MSP Relationships Create Governance Blind Spots

The structural weakness lies in the trust asymmetry embedded in MSP relationships. MSPs are granted privileged access precisely because they are trusted; threat actors exploit this same trust to move laterally across entire client bases without triggering traditional security alerts. A compromised RMM platform becomes a unified control hub for attacking multiple victims simultaneously—a force multiplier that traditional endpoint detection cannot easily distinguish from legitimate administrative activity. The governance failure is compounded by contractual architecture: most MSP agreements lack explicit obligations to secure RMM platforms, detect compromise within defined timeframes, or notify clients aligned with regulatory requirements. When threat actors use RMM tools to extract personal data, the notification burden and regulatory exposure fall on the client organization, not the MSP that failed to secure the platform. Under NIS2 and DORA, a single RMM compromise affecting multiple essential service providers could trigger mandatory notification within 24 hours—yet many organizations lack visibility into whether their MSP's platform has been compromised, let alone contractual mechanisms to demand immediate disclosure. This creates perverse incentives: MSPs have limited financial exposure to RMM security failures, while clients face breach notification costs, regulatory fines, and reputational damage.

The Frictionless Onboarding Problem: Security Theater in Vendor Platforms

Huntress research identified a specific vulnerability in Atera's trial onboarding: it requires only an email address to provision a free trial account. As noted in MSP community forums, this "frictionless" approach is excellent for sales metrics but effectively distributes a weaponized, EDR-evading backdoor to every script kiddie and ransomware gang operating at scale. This is not a technical vulnerability in the traditional sense; it is a business model decision that prioritizes user acquisition over account security. The implication is stark: organizations selecting MSPs must now evaluate not only the security controls of the RMM platform itself, but the onboarding and authentication architecture that determines how easily threat actors can gain initial access. This evaluation rarely appears in standard vendor risk questionnaires. The governance gap is significant: procurement teams evaluate MSPs on capability and cost; security teams may assess technical controls; but few organizations systematically evaluate the account provisioning and trial access mechanisms that determine initial compromise risk.

Governance Implications: Three Immediate Actions

First, vendor risk assessments must explicitly evaluate RMM platform security controls, patch cadence, and account provisioning architecture. Standard questionnaires must include questions about trial account security, multi-factor authentication requirements, and detection capabilities for unauthorized access. Second, MSP contracts must include mandatory incident notification timelines aligned with regulatory requirements (24 hours for NIS2 entities), explicit obligations to detect and report RMM compromise, and clear liability allocation for data breaches originating from platform compromise. Third, organizations must implement continuous monitoring of MSP access patterns, maintain forensic capability to determine breach origin, and establish escalation protocols that treat RMM telemetry as a high-confidence signal of potential compromise—especially when correlated with adjacent suspicious activity such as unusual PowerShell execution, lateral movement, or data transfer patterns.

Cybersol's Perspective: Why Organizations Overlook This Risk Layer

Most vendor risk frameworks treat MSPs as operational partners with standard liability caps and service level agreements. They are not integrated into the organization's regulatory risk framework with the same rigor applied to cloud infrastructure providers or payment processors. This is a critical oversight. An MSP compromise is functionally equivalent to a breach of the organization's own infrastructure—it provides threat actors with the same privileged access, the same lateral movement capability, and the same data exfiltration potential. Yet contractual accountability, notification obligations, and liability allocation remain underdeveloped. Organizations often lack visibility into which RMM platforms their MSPs use, what security controls are in place, or what incident response procedures exist. When compromise occurs, the discovery process is reactive rather than proactive. The governance implication is clear: MSP relationships must be elevated from operational arrangements to regulatory risk components, with explicit contractual obligations, continuous monitoring, and incident response protocols that align with NIS2, DORA, and sector-specific regulatory requirements.

Conclusion

The 277% surge in RMM exploitation is not a temporary trend; it reflects a deliberate attacker shift toward leveraging trusted infrastructure as an attack vector. Organizations must treat RMM platform security with the same rigor applied to their own infrastructure security, and contractual frameworks must allocate clear responsibility for detection, notification, and remediation. The original Huntress research, published in their 2026 Cyber Threat Report and reported by Channel Dive, provides detailed telemetry and recommendations. We encourage readers to review the full analysis to understand the specific attack patterns, tool-specific exploitation tactics, and detection strategies outlined in the research.

Source: Channel Dive, "Cybercriminals seize on MSP tools to harvest personal data," reporting on Huntress 2026 Cyber Threat Report. https://www.channeldive.com/news/cybercriminals-seize-msp-tools-connectwise-huntress-personal-data/813394/