Key Takeaways
- A phishing campaign (VENOMOUS#HELPER / STAC6405) has compromised >80 organizations, mainly in the United States, since April 2025.
- Attackers abuse legitimate Remote Monitoring and Management (RMM) tools—SimpleHelp and ScreenConnect—to gain stealthy, persistent remote access.
- The attack starts with a spoofed U.S. Social Security Administration (SSA) email that directs victims to a compromised Mexican website hosting a malicious executable.
- Once executed, the payload installs SimpleHelp as a Windows service with Safe‑Mode persistence, a self‑healing watchdog, and regular security‑product enumeration.
- Privilege escalation is achieved via SeDebugPrivilege and the legitimate “elev_win.exe” component, granting SYSTEM‑level control for screen capture, keystroke injection, and file transfer.
- ScreenConnect is later deployed as a redundant fallback channel, creating a dual‑channel architecture that survives detection or blocking of either RMM.
- Because the tools are signed and appear legitimate, traditional AV and signature‑based defenses often miss the activity, indicating a financially motivated Initial Access Broker or ransomware precursor.
- Mitigation requires blocking known malicious domains, enforcing least‑privilege accounts, monitoring for abnormal service installations, and applying application‑control policies to RMM software.
Overview of the Campaign
Since at least April 2025, an active phishing operation dubbed VENOMOUS#HELPER (also tracked as STAC6405 by Sophos) has targeted more than eighty entities, the majority located in the United States. Security researchers from Securonix note overlaps with previously identified clusters reported by Red Canary and Sophos, suggesting a shared toolset or infrastructure. While the threat actor remains unattributed, the campaign’s focus on establishing long‑term footholds aligns with the tactics of financially motivated Initial Access Brokers (IABs) or ransomware precursor groups seeking to sell access or prepare for later extortion stages.
Initial Phishing Vector
The intrusion begins with a carefully crafted email that masquerades as a notification from the U.S. Social Security Administration. The message urges the recipient to verify their email address and download a purported SSA statement by clicking an embedded link. This lure exploits trust in a government agency, increasing the likelihood that victims will interact with the malicious content without suspicion.
Use of Compromised Legitimate Websites
The link in the phishing email points to a legitimate‑but‑compromised Mexican business domain, gruta.com[.]mx. By hijacking an existing reputable site, attackers bypass many email‑spam and URL‑reputation filters that would otherwise block newly registered malicious domains. The compromised site hosts a second stage payload, keeping the initial URL benign‑looking while the true threat resides deeper in the infrastructure.
Delivery of the SimpleHelp RMM
From the compromised site, victims are redirected to an attacker‑controlled domain, server.cubatiendaalimentos.com[.]mx, which serves an executable disguised as an SSA statement. The file is a JWrapper‑packaged Windows binary that, when opened, silently installs the SimpleHelp Remote Monitoring and Management tool. Investigators believe the attackers gained access to a single cPanel account on the legitimate hosting server to stage this malicious binary, illustrating how a modest credential compromise can facilitate large‑scale distribution.
Persistence Mechanisms
Upon execution, the SimpleHelp client installs itself as a Windows service configured to start in Safe Mode, ensuring survival across reboots and minimal‑environment startups. A self‑healing watchdog component continuously monitors the service; if the process is terminated, it automatically restarts it within seconds. Additionally, the malware queries the root\SecurityCenter2 WMI namespace every ≈ 67 seconds to enumerate installed security products and polls user presence every ≈ 23 seconds, allowing it to adapt its behavior based on the endpoint’s defensive posture and activity level.
Privilege Escalation and Remote Control
To attain full interactive desktop access, the SimpleHelp client acquires the SeDebugPrivilege via the AdjustTokenPrivileges API call. This privilege enables the malware to open handles to other processes, a prerequisite for advanced manipulation. Simultaneously, the legitimate executable elev_win.exe—bundled with SimpleHelp—is leveraged to escalate to SYSTEM‑level rights. With these privileges, the attacker can capture the screen, inject keystrokes, access user‑context resources, and execute arbitrary commands within the victim’s desktop session, all while appearing as normal, signed software from a reputable U.K. vendor.
Deployment of ScreenConnect as a Redundant Channel
After establishing the primary SimpleHelp channel, the threat actor uses the gained SYSTEM access to download and install ConnectWise ScreenConnect. This secondary RMM serves as a fallback communication pathway; if security tools detect and block SimpleHelp, the attacker can still maintain control through ScreenConnect. The researchers describe this arrangement as a “redundant dual‑channel access architecture,” highlighting the attacker’s focus on resilience and continuity of operation despite defensive measures.
Impact on Victim Organizations
The dual‑channel setup leaves compromised hosts in a state where the adversary can return at any time, run commands covertly, transfer files in both directions, and pivot to laterally connected systems. Because the activity leverages legitimate, signed RMM applications, conventional antivirus and signature‑based solutions often generate no alerts, allowing the intrusion to persist unnoticed for extended periods. The primary motivation appears to be financial gain—either through selling access to other criminal groups or as a preparatory step for ransomware deployment—though no definitive ransomware payload has been observed in the reported incidents.
Detection and Mitigation Strategies
Organizations should adopt a layered defense approach to counter this tactic. First, block traffic to the known malicious domains (gruta.com[.]mx and server.cubatiendaalimentos.com[.]mx) at the firewall or DNS level. Second, enforce strict application‑control policies that permit only approved versions of RMM software and require multi‑factor authentication for their use. Third, monitor Windows service creation and modifications, especially those configured for Safe Mode, and alert on watchdog‑like processes that repeatedly restart services. Fourth, enable detailed logging of WMI queries and privilege‑use events (e.g., SeDebugPrivilege assignments) to detect anomalous enumeration or privilege escalation. Finally, conduct regular user‑awareness training focused on recognizing spoofed government communications and verifying unexpected requests for file downloads.
Conclusion
The VENOMOUS#HELPER campaign exemplifies how threat actors abuse trusted IT management tools to achieve stealthy, persistent access. By combining social engineering, compromised legitimate websites, and a dual‑RMM redundancy model, the attackers bypass many traditional defenses while maintaining a reliable foothold for future malicious activity. Recognizing the telltale signs—such as unauthorized service installations, privileged‑access abuse, and periodic security‑product probing—is essential for timely detection. Implementing the mitigation measures outlined above will significantly reduce the risk of falling victim to this evolving and resilient threat.

