By Jesse Whitton
Why Your Biggest IT Helper Might Be Your Biggest Security Risk
RMM tool abuse surged 277% last year. Attackers are weaponising the same remote access software your IT provider uses. Here's how to reduce your exposure.
For years, the "gold standard" for managing a small office's computers was to install a Remote Monitoring and Management (RMM) tool. These tools are powerful. They let IT providers log in remotely, fix issues, run scripts, push updates, and manage entire fleets of devices without ever leaving their desks. For small businesses that cannot afford a full-time IT person on site, RMM tools are what make outsourced IT support possible.
But that power is exactly what modern cybercriminals are now targeting. According to the Huntress 2026 Cyber Threat Report, the abuse of RMM tools by attackers surged by a staggering 277% last year. That is not a small uptick. It is an explosion in a specific type of attack that directly threatens the businesses least equipped to deal with it.
What Is an RMM Tool and Why Should You Care?
If your business uses an outsourced IT provider or managed service provider (MSP), there is a very good chance they have installed an RMM agent on every computer in your office. Common examples include ConnectWise, Datto, NinjaOne, and Atera. You have probably never interacted with these tools directly. They run quietly in the background, allowing your IT provider to monitor system health, push updates, and remotely troubleshoot problems.
The reason you should care is that these tools have deep access to your machines. An RMM agent can install software, execute commands, access files, and control the device as if someone were physically sitting in front of it. In the right hands, that is incredibly useful. In the wrong hands, it is a master key to your entire business.
How Attackers Are Exploiting RMM Tools
The problem is not that RMM tools themselves are broken or poorly built. The problem is that once an attacker gains access to one, they do not need to write custom malware or find a complex exploit. They simply use the tool's own built-in features to do whatever they want across every device it manages.
Stolen Credentials Give Attackers the Keys
The most common way attackers get into RMM platforms is through stolen credentials. According to a CISA advisory, threat actors obtain RMM login credentials through phishing campaigns, credential stuffing (trying username and password combinations from previous data breaches), and purchasing stolen credentials from brokers on dark web marketplaces.
If your IT provider's RMM dashboard is protected by a simple username and password without multi-factor authentication, a single compromised credential can give an attacker control over every device managed through that platform. For a small business with 10 or 20 computers, that means total exposure in one step.
Fake RMM Tools Are Being Sold as Legitimate Software
In a particularly alarming development from early 2026, Microsoft's security team identified a new campaign where attackers created an entirely fake RMM vendor called TrustConnect. They built a professional-looking website, priced their "product" at $300 per month, and even obtained a legitimate Extended Validation code-signing certificate to digitally sign their software. In reality, the product was a remote access trojan (RAT) designed to give attackers persistent, undetectable access to compromised machines.
This means the threat is not limited to attackers breaking into existing RMM tools. They are also creating convincing fakes that trick businesses and even IT providers into voluntarily installing backdoors on their own machines.
The Damage Happens Fast
When an RMM tool is compromised, the speed of the attack is devastating. The Huntress report found that when tools like RustDesk or Atera are abused, ransomware can be deployed across an entire fleet of devices in as little as one to two hours. By the time a small business owner realises something is wrong, every computer in the office is encrypted and a ransom demand is on the screen.
For a business with 10 or 20 staff, this is not a recoverable setback without significant cost and downtime. It is often a business-ending event.
Why Small Businesses Are Disproportionately Affected
Large enterprises have security operations centres that monitor for unusual RMM activity. They have network segmentation that limits how far an attacker can move. They have dedicated security teams that review access logs daily. Small businesses typically have none of these things.
Too Many Tools, Not Enough Oversight
It is common for a small business to have multiple remote access tools installed on the same machines — sometimes because they switched IT providers and the old tool was never removed, sometimes because a vendor installed their own tool for support purposes, and sometimes because an employee installed one to work from home. Each additional tool is another potential entry point for an attacker, and if nobody knows it is there, nobody is monitoring it.
Arctic Wolf's research highlights that a lack of multi-factor authentication, improper network segmentation, insufficient activity logging, and insider threats are the primary risk factors for RMM exploitation. Most small businesses check none of these boxes.
The "Set It and Forget It" Problem
Many small business owners hand IT management to a provider and then never think about it again. That is understandable — you hired someone specifically so you would not have to worry about it. But this creates a blind spot. If you do not know what tools are running on your devices, you cannot ask the right questions about how they are secured. You are trusting that your IT provider has implemented best practices, but you have no way to verify it.
This is not about blaming your IT provider. Most are doing good work. It is about acknowledging that in 2026, the tools that keep your business running are also the tools that attackers are actively targeting, and blind trust is no longer sufficient.
Practical Steps to Reduce Your RMM Risk
The first step to fixing this is not a new piece of security software. It is visibility. You need to know exactly which tools are installed on which machines, who has access to them, and whether they are actually necessary for your daily operations.
Audit Your Remote Access Tools Quarterly
Sit down with your IT provider and ask for a complete list of every remote access or RMM agent installed across your devices. This should include the official tool they use to manage your systems, but also any legacy tools from previous providers, vendor support tools, and personal remote desktop applications installed by staff. If a tool is not actively needed, remove it. Every unnecessary remote access agent is an unmonitored door into your network.
Require Multi-Factor Authentication on All RMM Access
Ask your IT provider whether their RMM platform is protected by multi-factor authentication. This is non-negotiable in 2026. If the answer is no, or if you get a vague response, that is a red flag. MFA should be enabled for every admin account on the RMM platform, and ideally restricted to specific IP addresses as well. This single step blocks the majority of credential-based attacks.
Ask for Access Logs and Review Them
Your IT provider should be able to show you who accessed your devices, when, and what they did. If they cannot provide this information, you have a visibility gap that needs to be addressed. You do not need to review every log entry yourself, but you should be able to see a summary of remote access activity on a monthly basis. Look for access at unusual hours, from unfamiliar locations, or by accounts you do not recognise.
Set Alerts for Unusual Activity
Most RMM platforms support alerting for unusual behaviour — logins from new IP addresses, large script executions, bulk file operations, or the installation of new software. Ask your IT provider to enable these alerts and direct them to someone who will actually review them. An alert that goes to an unmonitored inbox is the same as no alert at all.
Include RMM Tool Removal in Your Offboarding Process
When an employee leaves or a device is decommissioned, removing RMM access should be part of the standard process. This includes revoking user accounts, uninstalling agents from the device, and confirming with your IT provider that the device has been removed from their management console. Dormant RMM agents on old machines are a common and easily avoidable attack vector.
Rotate Credentials Regularly
RMM passwords and API keys should be changed on a regular schedule — at minimum every 90 days, and immediately if there is any suspicion of compromise. Use a password manager to generate strong, unique credentials for every tool. Reused or stale passwords are the single most common way attackers gain initial access.
Having the Right Conversation With Your IT Provider
If you use an outsourced IT provider, the most valuable thing you can do is have an informed conversation with them about RMM security. You do not need to be technical to ask these questions. In fact, asking them demonstrates that you take security seriously and hold your providers to a standard.
Ask them which RMM tool they use, whether it is protected by MFA, how they manage access for their own technicians, whether they have a process for removing access when one of their staff leaves, and whether they can provide you with regular access reports. A good IT provider will welcome these questions. If they are dismissive or unable to answer, it may be time to reconsider the relationship.
The Bigger Picture: Visibility Is the Foundation
RMM tools are not going away. They are essential for how modern IT support works, and they provide real value to small businesses that need expert help without the cost of a full-time IT team. The goal is not to remove them. It is to make sure they are visible, monitored, and properly secured.
The businesses that get into trouble are the ones that do not know what is running on their own machines. They cannot tell you which remote access tools are installed, who has admin credentials, or when the last security review was done. That blind spot is what attackers exploit.
This is exactly why visibility is at the core of what Vera does. Having a clear, up-to-date picture of your devices, your software, and your team's access is the foundation everything else — including RMM security — is built on.
The takeaway is simple: know what is on your machines, question who has access, and never assume that the tools keeping you safe cannot also be the tools that put you at risk.