📢⚠️ Researchers warn GoTo Resolve tool can be misused for silent access, sharing behaviour seen in ransomware‑linked tactics.

Read: https://hackread.com/goto-resolve-activities-ransomware-tactics/

#Cybersecurity #InfoSec #Malware #GoToResolve #Ransomware

GoTo Resolve Tool’s Background Activities Compared to Ransomware Tactics

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Malspam sent from Microsoft Outlook that is spreading #LogMeIn GoToResolve RMM, enabling threat actors to access the victim's machine from remote 💻🔍🕵️

IOCs:
📡 adwestmailcenter .com ➡️ Landing page
📡 insightme .im ➡️ fake PDF download

Payload hosted on Cloudflare R2 bucket, but already got nuked due to an abuse report from URLhaus 🙌
https://urlhaus.abuse.ch/url/3751500/

LogMeIn #GoToResolve payload 📄
https://bazaar.abuse.ch/sample/77e22f4e1af7758d6f7284f32a92539ea36a527fa89c8c6765f10a3f98a8d13e/

Another #malicious #gotoresolve / #logmeinrescue at:

https://fbsi\ .org/Receipt_Copy.msi

Company ID: 9119452146254695709

https://app.any.run/tasks/2b763be2-88e2-4f8c-b26a-a2abb81f497d

Analysis https://fbsi.org/Receipt_Copy.msi Malicious activity - Interactive analysis ANY.RUN

Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.