Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Services

Emerging Threat: Fake ScreenConnect Attachments

Case Study: Emerging Threat – Fake ScreenConnect Attachments

Overview

In mid-2025, Professional IT identified a rising cybersecurity threat targeting small to medium businesses across Australia: malicious attachments disguised as legitimate ScreenConnect installers. This case study explores how these attacks are executed, the real-world impact on one client, and how proactive security measures protected another.

Background

ScreenConnect (now ConnectWise Control) is a legitimate remote support tool widely used by IT providers. Recently, threat actors have begun leveraging its familiarity and trustworthiness to distribute malicious versions of the tool as part of sophisticated phishing campaigns.

Threat Summary

Attackers compromise trusted email accounts and insert malicious ScreenConnect installers as attachments—often disguised as PDFs. Once executed, these files grant full remote access to the attacker, who can:

– Extract saved passwords and browser sessions
– Access banking credentials and sensitive data
– Remain undetected for extended periods
– Launch secondary attacks or financial fraud

Case A: Sophisticated Social Engineering Attack

Client Profile

Client A – A medical practice that frequently exchanges documents with external vendors via cloud file-sharing platforms (e.g., files.fm).

In one recent case, an attacker had compromised the email account of a vendor staff member (“Vendor A”). They observed email patterns and noticed regular file exchanges with our client Client A via files.fm.

After patiently watching the correspondence, the attacker struck. Knowing that Client A was expecting a document, they sent a malicious ScreenConnect installer disguised as a PDF—perfectly timed to match the expected delivery.

Once opened, the attacker gained full access to the computer. They even sent the real PDF afterward to reduce suspicion—Client A assumed the first file had simply glitched.

The attackers waited for the next payroll session, silently captured the entire banking session, and later initiated over $50,000 in fraudulent transactions.

Case B: Threat Contained via MTDRS (EDR)

Client Profile

Another Professional IT client in the healthcare sector, enrolled in our Managed Threat Detection & Response Suite (MTDRS) or commonly known as Endpoint Detection and Response (EDR).

In contrast Client B was protected by our Managed Threat Detection & Response Suite (MTDRS). They received what appeared to be a bank statement—but in reality, it was a malicious ScreenConnect installer.

Thanks to MTDRS:

  • The agent detected the abnormal behavior immediately

  • The device was isolated from the network

  • Our team was alerted and able to act before any damage occurred

This incident was prevented—not remediated—because MTDRS acted faster than any user or IT administrator could.

Lessons Learned

– Trusted tools can be exploited – familiarity breeds complacency.
– Social engineering is evolving – attackers now mimic business processes, not just branding.
– Anti-virus is not enough – real-time threat detection and isolation are critical.

Author

Professional IT

Leave a Reply

Discover more from Professional IT

Subscribe now to keep reading and get access to the full archive.

Continue reading