Crazy Ransomware Using Legitimate Monitoring Tools

In recent months, cybersecurity researchers have discovered that advanced ransomware operators are abusing legitimate employee-monitoring and remote-support software as covert access channels into corporate networks. This shift represents a tactical evolution in ransomware tradecraft, where adversaries are eschewing traditional malware droppers in favor of tools designed for everyday IT administration.

Crazy Ransomware Using Legitimate Monitoring Tools

By weaponizing these commercial products, attackers not only evade detection mechanisms but also gain persistent, interactive control of compromised systems, setting the stage for disruptive ransomware deployment and other financially motivated malicious activity.

In a technical breakdown by security firm Huntress, researchers showed how threat actors have leveraged employee monitoring software and remote monitoring and management (RMM) platforms to go well beyond passive observation. These intrusions represent a subtle yet dangerous shift in how ransomware affiliates achieve and maintain footholds within victim environments.

In its February 2026 reporting, BleepingComputer described how a threat actor linked to the Crazy ransomware gang used Net Monitor for Employees Professional, marketed as a legitimate employee monitoring tool, alongside SimpleHelp, an RMM platform, to establish covert access on compromised hosts. This combination allowed attackers not only to observe user activity but also to actively control systems, transfer files, and execute commands remotely.

Investigators from Huntress detailed the mechanisms behind these abuses, revealing that although Net Monitor for Employees carries a name that implies passive surveillance, it actually bundles features that rival those of a fully functional remote access tool (RAT). Through a pseudo-terminal component (winpty-agent.exe), the software can run commands on a host in real time, enabling attackers to perform reconnaissance, manipulate accounts, and deploy additional tooling.

According to Huntress, attackers exploited this capability to manipulate system accounts, including attempts to enable the local Administrator account, a classic post-compromise tactic, using Windows command utilities. They then deployed SimpleHelp as a secondary persistence mechanism, establishing an ever-present channel for interactive access even if the primary monitoring tool were discovered or removed.

These abuses were not subtle glitches: attackers installed the monitoring and support tools using Windows Installer (msiexec.exe) and PowerShell, often pulling binaries and configuration files directly from external servers under attacker control. Where possible, they masked these binaries under familiar Windows-like names to avoid suspicion.

Although the BleepingComputer reporting emphasized the attempted deployment of the Crazy ransomware payload in at least one incident, the Huntress analysis went further, uncovering evidence that threat actors configured their monitoring agents with keyword-based triggers. These triggers scanned for terms relating to cryptocurrency wallets, exchanges, blockchain explorers, and payment platforms, suggesting that attackers were also positioning themselves to steal crypto assets directly.

The ability to monitor for specific application names, such as MetaMask, Binance, KuCoin, and others, indicates a level of sophistication not typically associated with simple ransomware infections. Instead of just encrypting data and demanding payment, this hybrid threat model combines financial theft, persistence, and traditional ransomware tactics.

At various points during intrusions, attackers also attempted to disable defensive software like Windows Defender and modify security settings to make their presence more resilient. By entrenching themselves across multiple vectors, a stealth monitoring service and a remote access channel, they strengthened their foothold and extended the time window in which they could operate undetected.

Tradecraft and Tactics

Technical analysis behind these intrusions reveals a systematic attack chain involving the following key phases:

  • Initial access through compromised credentials or remote access points such as SSL VPNs, followed by deployment of a legitimate-looking monitoring agent via installation utilities.
  • Co-option of the monitoring software to achieve interactive control and reconnaissance, effectively turning software intended for HR oversight into a command-and-control conduit.
  • Installation of an RMM platform like SimpleHelp as a secondary channel with gateway redundancy, allowing attackers to reconnect even after defensive teams begin remediation.

What distinguishes these intrusions from classic ransomware campaigns is the threat actors' use of legitimate software functions to perform malicious operations. Rather than relying exclusively on custom malware that might trigger antivirus or endpoint detection systems, they leveraged trusted processes and allowed the tools themselves to do the heavy lifting. This strategy lets attackers evade signature-based detection while blending their activity into seemingly normal administrative behavior.

Furthermore, the reuse of configuration artifacts, overlapping infrastructure, shared filenames, and consistent command-and-control (C2) endpoints across incidents strongly suggests a single operator or tightly coordinated group behind these intrusions. This unified footprint implies a level of operational maturity beyond random or opportunistic attacks.

Faced with this growing abuse of legitimate software, cybersecurity professionals emphasize the need for vigilant monitoring and strict access control. Huntress's analysis points to several foundational security principles that can drastically reduce the likelihood of similar compromises:

  • Enforce multifactor authentication (MFA) for all remote access points, including VPNs, RDP gateways, and other external interfaces; compromised credentials remain a primary attack vector.
  • Audit and govern third-party software usage, especially tools with remote command execution capabilities, treating them with the same scrutiny as high-privilege system software.
  • Restrict software installation privileges, limiting who and what can install executables and using application whitelisting to prevent unauthorized RMM agents from running.
  • Monitor process chains for anomalies, such as unusual parent/child relationships between system utilities and unexpected executables, which are common hallmarks of malicious activity.

Beyond technological measures, organizations need to couple perimeter defenses with continuous internal monitoring. Because these attacks rely on blending into legitimate activity, teams must analyze and alert on deviations from established baselines, such as unscheduled installations of monitoring tools or the use of abnormal service names.

The incidents involving Crazy ransomware affiliates are part of a broader trend in which ransomware groups adapt to heightened defenses by innovating how they gain persistence. While old campaigns often relied on phishing attachments, exploit kits, or brute-force access attempts, newer operations emphasize stealth and legitimacy by design.

By abusing tools that are normal fixtures in enterprise IT environments, such as employee monitoring systems and remote support platforms, attackers are exploiting trust relationships that defenders have long relied on. This paradigm challenges traditional security architectures that focus disproportionately on blocking malware while underestimating the risk posed by misused legitimate software.

As defenders improve defenses against common ransomware vectors, attackers will continue to pivot toward approaches that minimize noise and maximize persistence. The abuse of employee monitoring and RMM software signals a need for security teams to shift their focus from understanding what software is installed on their networks to how it is being used.

Share:

facebook
X (Twitter)
linkedin
copy link
Karolis Liucveikis

Karolis Liucveikis

Experienced software engineer, passionate about behavioral analysis of malicious apps

Author and general operator of PCrisk's News and Removal Guides section. Co-researcher working alongside Tomas to discover the latest threats and global trends in the cyber security world. Karolis has experience of over 8 years working in this branch. He attended Kaunas University of Technology and graduated with a degree in Software Development in 2017. Extremely passionate about technical aspects and behavior of various malicious applications.

▼ Show Discussion

PCrisk security portal is brought by a company RCS LT.

Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

Donate