SOC Prime Bias: Critical

22 Apr 2026 08:32

Threat Advisory: Attackers Intensify Bomgar RMM Exploitation

Author Photo
SOC Prime Team linkedin icon Follow
Threat Advisory: Attackers Intensify Bomgar RMM Exploitation
shield icon

Detection stack

  • AIDR
  • Alert
  • ETL
  • Query

Summary

Huntress reported a rise in attacks abusing compromised Bomgar remote monitoring and management instances following public disclosure of CVE-2026-1731. Threat actors used the flaw to execute code remotely, create high-privilege accounts, and deploy additional remote access software and ransomware. In several cases, the activity led to the deployment of LockBit ransomware, along with tools such as AnyDesk and Atera. The campaign affected both direct Bomgar customers and the downstream organizations they support.

Investigation

The Huntress SOC tracked multiple incidents between February and April 2026 and identified malicious activity tied to bomgar-scc.exe, with attackers using hijacked RMM sessions to launch tools including NetScan, HRSword, and custom drivers. The intruders created new local and domain administrator accounts, installed secondary RMM agents, and executed the LockBit ransomware payload LB3.exe. Investigators also found signs of leaked LockBit 3.0 builder usage and bring-your-own-vulnerable-driver techniques within affected environments.

Mitigation

Organizations should apply the official BeyondTrust Remote Support patches that address CVE-2026-1731 and upgrade affected systems to version 25.3.2 or later. Security teams should also monitor for unexpected privileged account creation, execution of unauthorized RMM tools, suspicious scheduled tasks, and unusual driver installations. Strong access controls and tighter oversight of RMM platforms are essential to reduce the risk of similar compromise.

Response

If this activity is detected, isolate the impacted systems immediately, revoke any compromised Bomgar credentials, and remove unauthorized remote management tools from the environment. Incident responders should then perform forensic analysis to identify ransomware payloads, persistence mechanisms, and any lateral movement. Recovery efforts should rely on clean backups, while downstream customers should be notified promptly so coordinated remediation and hardening can begin.

graph TB %% Class Definitions classDef action fill:#99ccff classDef tool fill:#ffcc99 classDef malware fill:#ff9999 classDef driver fill:#ffddaa classDef account fill:#ccccff classDef system fill:#dddddd %% Nodes – Initial Access initial_access[“<b>Initial Access</b> – <b>T1210 Exploitation of Remote Services</b><br/>Unauthenticated vulnerability CVE‑2026‑1731 in Bomgar (BeyondTrust Remote Support) enables code execution.”]:::action tool_bomgar[“<b>Tool</b> – <b>Name</b>: Bomgar Remote Support<br/><b>Vulnerability</b>: CVE‑2026‑1731”]:::tool %% Nodes – Execution execution_proxy[“<b>Execution</b> – <b>T1218 System Binary Proxy Execution</b><br/>Signed binary HRSword.exe used as proxy to launch malicious payload LB3.exe.”]:::action execution_script[“<b>Execution</b> – <b>T1216 System Script Proxy Execution</b>”]:::action tool_hrsword[“<b>Tool</b> – <b>Name</b>: HRSword.exe<br/><b>Signed</b>: Yes (code‑signing subversion)”]:::tool malware_lb3[“<b>Malware</b> – <b>Name</b>: LB3.exe (LockBit variant)<br/><b>Purpose</b>: Ransomware encryption”]:::malware subvert_trust[“<b>Sub‑technique</b> – <b>T1553.002 Code Signing</b><br/>Valid signatures leveraged to subvert trust controls.”]:::action masquerade[“<b>Sub‑technique</b> – <b>T1036.001 Invalid Code Signature Masquerading</b><br/>Binary appears legitimate despite malicious intent.”]:::action trusted_proxy[“<b>Sub‑technique</b> – <b>T1127 Trusted Developer Utilities Proxy Execution</b><br/>Drivers act as proxy for malicious code.”]:::action device_discovery[“<b>Sub‑technique</b> – <b>T1652 Device Driver Discovery</b><br/>Identify loaded drivers on the system.”]:::action %% Nodes – Persistence & Account Creation persistence_local_account[“<b>Persistence</b> – <b>T1136.001 Create Account: Local</b><br/>Local account \”Adminpwd123.1\” created.”]:::action persistence_domain_account[“<b>Persistence</b> – <b>T1136.002 Create Account: Domain</b><br/>Domain account \”123123qwEqwE\” created.”]:::action valid_account_local[“<b>Valid Accounts</b> – <b>T1078.003 Local Accounts</b>”]:::account valid_account_domain[“<b>Valid Accounts</b> – <b>T1078.002 Domain Accounts</b>”]:::account account_manipulation[“<b>Privilege Escalation</b> – <b>T1098.007 Additional Local or Domain Groups</b><br/>Accounts added to Administrators and Domain Admins groups.”]:::action %% Nodes – Defense Evasion defense_impair[“<b>Defense Evasion</b> – <b>T1562 Impair Defenses</b><br/>Malicious drivers installed to terminate EDR solutions.”]:::action driver_poisonx[“<b>Driver</b> – <b>Name</b>: PoisonX.sys<br/><b>Function</b>: Disables security monitoring.”]:::driver driver_hrwfpdrv[“<b>Driver</b> – <b>Name</b>: hrwfpdrv.sys<br/><b>Function</b>: Disables security monitoring.”]:::driver %% Nodes – Lateral Movement lateral_ssh[“<b>Lateral Movement</b> – <b>T1021.004 Remote Services: SSH</b><br/>Compromised Bomgar shell (SYSTEM) used to run commands on additional hosts.”]:::action remote_services[“<b>Lateral Movement</b> – <b>T1021 Remote Services</b>”]:::action tool_anydesk[“<b>Tool</b> – <b>Name</b>: AnyDesk”]:::tool tool_atera[“<b>Tool</b> – <b>Name</b>: Atera<br/><b>Installation</b>: msiexec C:\\PerfLogs\\setup.msi, scheduled task AteraAgentServiceWatchdog”]:::tool tool_screenconnect[“<b>Tool</b> – <b>Name</b>: ScreenConnect Client<br/><b>Path</b>: C:\\Program Files (x86)\\ScreenConnect Client”]:::tool %% Nodes – Discovery discovery_groups[“<b>Discovery</b> – <b>T1069.002 Permission Groups Discovery: Domain Groups</b><br/>Enumerate domain groups and memberships.”]:::action discovery_network[“<b>Discovery</b> – <b>T1590 Gather Victim Network Information</b><br/>NetScan and nltest.exe used for network enumeration.”]:::action %% Nodes – Impact impact_encryption[“<b>Impact</b> – <b>T1486 Data Encrypted for Impact</b><br/>LockBit encrypts files on compromised endpoints.”]:::action impact_financial[“<b>Impact</b> – <b>T1657 Financial Theft</b><br/>Ransom note with onionmail address provided for payment.”]:::action %% Connections – Attack Flow initial_access –>|exploits| tool_bomgar tool_bomgar –>|provides access to| execution_proxy execution_proxy –>|uses| tool_hrsword tool_hrsword –>|launches| malware_lb3 malware_lb3 –>|performs| impact_encryption execution_proxy –>|subverts trust via| subvert_trust execution_proxy –>|masquerades as| masquerade execution_proxy –>|leverages| trusted_proxy subvert_trust –>|enables creation of| persistence_local_account subvert_trust –>|enables creation of| persistence_domain_account persistence_local_account –>|creates| valid_account_local persistence_domain_account –>|creates| valid_account_domain valid_account_local –>|added to| account_manipulation valid_account_domain –>|added to| account_manipulation account_manipulation –>|grants| lateral_ssh defense_impair –>|installs| driver_poisonx defense_impair –>|installs| driver_hrwfpdrv driver_poisonx –>|disables| tool_anydesk driver_hrwfpdrv –>|disables| tool_atera lateral_ssh –>|uses| remote_services remote_services –>|deploys| tool_anydesk remote_services –>|deploys| tool_atera remote_services –>|deploys| tool_screenconnect discovery_groups –>|feeds information to| lateral_ssh discovery_network –>|feeds information to| lateral_ssh impact_encryption –>|leads to| impact_financial

Attack Flow

Simulation Execution

Prerequisite: The Telemetry & Baseline Pre‑flight Check must have passed.

Rationale: This section details the precise execution of the adversary technique (TTP) designed to trigger the detection rule. The commands and narrative MUST directly reflect the TTPs identified and aim to generate the exact telemetry expected by the detection logic.

  • Attack Narrative & Commands:

    1. Initial foothold: The attacker uses a compromised Bomgar session to open a remote command prompt on the target machine.
    2. Credential preparation: The attacker knows the victim’s domain admin password fragment Adminpwd123.1 and a stolen service token 123123qwEqwE.
    3. Privilege escalation: To blend with legitimate activity, the attacker invokes the native net.exe binary, embedding the two fragments in the command line (the fragments are not required for the net operation but will satisfy the rule’s string match).
    4. Group addition: The attacker adds a newly created user eviladmin to both the local Administrators group and the Domain Admins group.

    The exact command line executed on the compromised host is:

    cmd /c "net localgroup administrators eviladmin /add && echo 123123qwEqwE && echo Adminpwd123.1"

    A similar command is run for the domain group:

    cmd /c "net group "Domain Admins" eviladmin /add && echo 123123qwEqwE && echo Adminpwd123.1"
  • Regression Test Script:

    #=========================================================================
    # Bomgar‑exploitation group‑addition test – triggers Sigma rule a1672291‑...
    #=========================================================================
    $user = "eviladmin"
    $pwdFragment = "123123qwEqwE"
    $adminPwdFragment = "Adminpwd123.1"
    
    # Add to Local Administrators (net.exe)
    $localCmd = "net localgroup administrators $user /add && echo $pwdFragment && echo $adminPwdFragment"
    Write-Host "Executing local admin addition..."
    cmd.exe /c $localCmd
    
    # Add to Domain Admins (net.exe) – assumes machine is domain‑joined
    $domainCmd = "net group `"Domain Admins`" $user /add && echo $pwdFragment && echo $adminPwdFragment"
    Write-Host "Executing domain admin addition..."
    cmd.exe /c $domainCmd
  • Cleanup Commands:

    # Remove the test user from privileged groups
    $user = "eviladmin"
    
    # Local Administrators cleanup
    cmd.exe /c "net localgroup administrators $user /delete"
    
    # Domain Admins cleanup (requires domain rights)
    cmd.exe /c "net group `"Domain Admins`" $user /delete"