RAT disguised as an RMM costs crims $300 a month • The Register
MSP Compromise as Governance Failure: Why Third-Party Risk Assessment Frameworks Are Structurally Inadequate
Framing: The Cascading Liability Problem
When threat actors compromise a managed service provider to deploy ransomware through legitimate remote monitoring and management tools, they expose a fundamental structural weakness in how organizations govern third-party risk. This is not a technical vulnerability that patches can fix. It is a governance and contractual architecture problem. A single MSP breach can trigger simultaneous notification obligations across multiple regulatory regimes, create liability disputes between client and vendor, expose gaps in cyber insurance coverage, and compromise the incident response capabilities of dozens of downstream organizations at once. For boards, general counsel, and compliance officers, MSP-mediated attacks represent a category of risk that traditional vendor assessment questionnaires and compliance attestations were never designed to address.
The Trust Relationship as Attack Surface
The DragonForce group's strategy—first compromising an MSP, then leveraging its RMM access to push ransomware into client environments—exploits the fundamental asymmetry in modern IT service delivery. Organizations grant MSPs elevated administrative privileges and persistent remote access because operational efficiency and cost control demand it. But this trust relationship is rarely reciprocated with equivalent monitoring, contractual controls, or incident response frameworks. Most vendor risk assessments focus on the MSP's own security posture: certifications, audit reports, security policies. Few organizations conduct continuous monitoring of the actual tools, access pathways, and administrative activities that the MSP maintains within their own infrastructure. The RMM software becomes a force multiplier for attackers precisely because it is designed to be trusted and to operate with minimal friction. Once compromised, it becomes an insider threat that no perimeter defense can detect.
Regulatory Notification Cascades and Conflicting Timelines
MSP compromises create a specific regulatory problem that existing incident response frameworks inadequately address: the notification cascade. When a single MSP serves clients across healthcare, financial services, energy, and local government sectors, a single breach event can trigger notification obligations under NIS2, DORA, HIPAA, PCI-DSS, and sector-specific regulations simultaneously. But the MSP's incident detection and notification timeline may not align with each client's regulatory deadlines. An organization may be required to notify regulators within 72 hours, but its MSP may not complete forensics or attribution for weeks. This creates a structural conflict: the organization becomes dependent on its service provider's incident response capability while remaining liable for regulatory non-compliance if notification is delayed. Contractual provisions governing notification timelines, forensic access, and information sharing are often absent or vague, leaving organizations exposed to regulatory enforcement action for breaches they did not directly cause and could not independently investigate.
Contractual Liability Gaps and Insurance Coverage Uncertainty
Most MSP service agreements allocate liability through standard limitation-of-liability clauses that cap damages at annual contract value or a fixed amount. These provisions were designed for service availability failures, not for scenarios where the service provider's infrastructure becomes the attack vector for ransomware affecting the client's critical operations. Cyber insurance policies add another layer of complexity. Many policies distinguish between direct attacks on the insured organization and losses resulting from third-party compromise. An organization victimized through an MSP breach may find that its cyber insurance carrier disputes coverage on the grounds that the loss resulted from the vendor's negligence rather than a direct attack on the insured. Meanwhile, the MSP's own cyber liability policy may exclude coverage for losses suffered by downstream clients. This creates a coverage gap where the organization bears the financial impact of a breach it did not cause and could not have prevented through its own security controls. Contractual provisions addressing cyber insurance requirements, coverage coordination, and liability allocation in third-party compromise scenarios are often absent from MSP agreements.
Supply Chain Risk Aggregation and Correlated Exposure
Organizations typically evaluate MSPs in isolation: Does this vendor meet our security requirements? Does it have the certifications we need? But MSP-mediated attacks reveal a critical blind spot in this assessment methodology. An MSP's risk profile is not determined solely by its own security controls. It is determined by the aggregate risk created by its entire client portfolio. If an MSP serves 500 organizations across multiple sectors, a compromise affecting one client can potentially impact others through shared infrastructure, cross-contamination of administrative credentials, or lateral movement through the MSP's internal network. This creates correlated risk that traditional vendor risk assessments do not capture. An organization may select an MSP with excellent security controls and certifications, only to be compromised because the MSP's other clients include organizations with weaker security postures or higher threat exposure. Vendor risk frameworks need to evolve to include assessment of the MSP's entire client portfolio, the segregation of administrative access across clients, and the potential for cross-client contamination in breach scenarios.
Cybersol's Perspective: The Governance Layer That Remains Invisible
MSP compromises expose a systemic weakness in how organizations approach third-party risk governance. The problem is not that MSPs are inherently insecure. It is that the contractual, regulatory, and operational frameworks governing MSP relationships were designed for a different threat model. They assume that third-party risk can be managed through compliance questionnaires, audit reports, and liability caps. They do not adequately address continuous monitoring of privileged access, incident response coordination across multiple regulatory regimes, or liability allocation when the service provider's infrastructure becomes the attack vector. Organizations often overlook the regulatory notification complexity created by MSP dependencies. They assume that their incident response plan addresses third-party breaches, when in fact most plans focus on direct attacks. They do not adequately address the question of who controls the incident response timeline when regulatory notification deadlines are at stake. The risk layer that deserves more attention is contractual: specific provisions governing notification timelines, forensic access, cyber insurance requirements, and liability allocation in third-party compromise scenarios. These provisions are often absent from MSP agreements, leaving organizations exposed to regulatory enforcement action, insurance coverage disputes, and financial losses that could have been mitigated through better contractual governance.
Conclusion
The DragonForce group's MSP-focused attack strategy is not a novel technical exploit. It is a demonstration of how existing governance frameworks fail to address the structural risks created by privileged third-party relationships. Organizations should review The Register's detailed reporting on this attack pattern and use it as a catalyst to reassess their own MSP governance frameworks, contractual provisions, and incident response planning. The question is not whether your MSP is secure. The question is whether your organization has adequate contractual controls, regulatory notification procedures, and cyber insurance coverage to manage the risk created when your MSP is compromised. For most organizations, the answer is no.
Source: The Register, "RAT disguised as an RMM costs crims $300 a month," https://www.theregister.com/2026/02/19/rmm_rat_trustconnect/
Author: The Register