Credential Harvesting Campaign Targets ScreenConnect
Would you like to learn more?
Download our Pentest Sourcing Guide to learn everything you need to know to successfully plan, scope, and execute your penetration testing projects.
A sophisticated phishing campaign has surfaced targeting ScreenConnect (now part of ConnectWise Control) cloud administrators. Threat actors have mimicked legitimate ScreenConnect login alerts to harvest credentials, successfully bypassing multi-factor authentication (MFA) and enabling widespread compromise across managed service provider (MSP) networks.
Here are the top takeaways:
The Phishing Campaign: an Overview
In early 2025, MSP administrators began receiving phishing emails that looked alarmingly legitimate, claiming to be authentication alerts from ScreenConnect’s RMM platform. These emails contained links prompting recipients to “login and review the security alert.” Clicking the link directed them to a cleverly spoofed domain like cloud.screenconnect[.]com.ms, designed to appear identical to the real ScreenConnect login page.
Behind the scenes, the phishing site operated as a reverse proxy—forwarding credentials and time-based one-time passwords (TOTPs) to the legitimate ScreenConnect portal while capturing them via an adversary-in-the-middle (AiTM) framework known as Evilginx. This technique allowed attackers to bypass MFA protections and log in as super administrators, gaining full control over MSP environments.
Deployment of Malicious ScreenConnect Instances and Lateral Movement
Once inside the environment, attackers deployed a malicious ScreenConnect instance (ru.msi
) across multiple customer systems, effectively giving them a stealthy foothold.
They then performed network reconnaissance, reset user credentials, and deployed widely used tools for lateral movement such as PsExec, WinRM, and NetExec.
Exploiting Backup Vulnerabilities & Enabling Extortion
In parallel, threat actors exploited CVE-2023-27532, a vulnerability within Veeam Cloud Backup, to extract unencrypted credentials and disable backup functions, greatly hampering recovery efforts.
Before deploying ransomware, the attackers compressed files using WinRAR and exfiltrated sensitive data to EasyUpload.io via Incognito mode in Chrome to evade detection. They then modified boot settings to launch systems in Safe Mode with networking, bypassing many endpoint protections.
Ransomware and Double Extortion Tactics
With persistence established, the attackers launched the Qilin Ransomware, a notorious Ransomware-as-a-Service (RaaS) group formerly known as "Agenda."
Each victim received a unique version, complete with customized passwords and ransom notes. Their double extortion approach included both encryption and data leakage via platforms like “WikiLeaksV2.”
Broader MSP Ecosystem Vulnerability
MSPs serve as high-value targets because they hold privileged access to multiple downstream clients. A single compromised account can cascade into a multi-organization security breach.
CISA has also highlighted the broader risks associated with unpatched features and authentication layers within ScreenConnect deployments, which can enable both credential harvesting and unauthorized remote control when abused.
Defense Strategies to Protect Against Future Attacks
To defend against such sophisticated threats, organizations—particularly MSPs—should consider implementing the following protections:
Deploy phishing-resistant authentication, such as FIDO2 or hardware security keys.
Enforce conditional access policies, limiting logins to known and managed devices.
Strengthen email security, using domain authentication (e.g., DMARC) and filters to flag spoofed links.
Enhance MFA defenses with anti-AiTM techniques and user education on impersonation tactics.
Promptly patch vulnerabilities, including those in remote access and backup systems like Veeam.
Conclusion
This sophisticated credential harvesting campaign targeting ScreenConnect cloud administrators illustrates how modern adversaries can bypass MFA and weaponize trusted administrative tools. Enabled by clever phishing tactics, proxy-based credential capture, and exploitation of backup systems, these attacks can disrupt entire MSP ecosystems and their customers.
Proactive measures—including strengthened authentication, conditional access controls, robust phishing defenses, and rapid patching—are essential for mitigating these risks. For MSPs and organizations alike, this is a compelling reminder that securing privileged access is not an option; it’s a necessity.
Contact Us
Speak with an Account Executive
Interested in Pentesting?

Penetration Testing Methodology
Our Penetration Security Testing methodology is derived from the SANS Pentest Methodology, the MITRE ATT&CK framework, and the NIST SP800-115 to uncover security gaps.
Download Methodology
Pentest Sourcing Guide
Download our Pentest Sourcing Guide to learn everything you need to know to successfully plan, scope, and execute your penetration testing projects.
Download GuideExplore in-depth resources from our ethical hackers to assist you and your team’s cyber-related decisions.

September 13 - Blog
Why Multi-Factor Authentication is Not Enough
Knowing is half the battle, and the use and abuse of common frameworks shed insight into what defenders need to do to build defense in depth.

November 19 - Blog
The Top Cybersecurity Statistics for 2024
The top cybersecurity statistics for 2024 can help inform your organization's security strategies for 2025 and beyond. Learn more today.

October 24 - Blog
Packetlabs at SecTor 2024
Packetlabs is thrilled to have been a part of SecTor 2024. Learn more about our top takeaway's from this year's Black Hat event.