Increased exploitation of legitimate remote access pathways and trusted tools in 2025 intrusions according to Blackpoint Cyber threat analysis
Summary
Hide ▲
Show ▼
A 2026 analysis of 2025 incident response cases by Blackpoint Cyber finds threat actors increasingly leveraging legitimate remote access pathways and trusted administrative tools to establish initial access and maintain persistence. Rather than relying on software vulnerabilities, attackers primarily abused valid credentials, SSL VPN sessions, and remote monitoring and management (RMM) tools such as ScreenConnect to blend into normal operations. In cloud environments, adversaries captured and reused authenticated session tokens following successful multi-factor authentication (MFA) via adversary-in-the-middle phishing, bypassing detection by appearing as legitimate sessions.
Timeline
-
01.04.2026 17:05 1 articles · 1h ago
Legitimate access pathways and trusted tools identified as primary intrusion vectors in 2025 incident analysis
Analysis of 2025 incident response cases by Blackpoint Cyber highlights that threat actors increasingly gain initial access via legitimate remote access methods, including SSL VPN sessions authenticated with compromised credentials (32.8% of cases) and rogue RMM tools such as ScreenConnect (30.3% of cases). Social engineering campaigns using deceptive prompts accounted for 57.5% of incidents, while adversary-in-the-Middle phishing captured authenticated session tokens post-MFA in approximately 16% of cloud compromises, enabling undetected reuse of legitimate sessions.
Show sources
- Routine Access Is Powering Modern Intrusions, a New Threat Report Finds — www.bleepingcomputer.com — 01.04.2026 17:05
Information Snippets
-
Remote access pathways and trusted administrative tools were the primary initial access vectors in analyzed intrusions, exceeding exploitation of software vulnerabilities.
First reported: 01.04.2026 17:051 source, 1 articleShow sources
- Routine Access Is Powering Modern Intrusions, a New Threat Report Finds — www.bleepingcomputer.com — 01.04.2026 17:05
-
SSL VPN abuse accounted for 32.8% of identifiable incidents, with threat actors authenticating using compromised credentials to establish seemingly legitimate VPN sessions.
First reported: 01.04.2026 17:051 source, 1 articleShow sources
- Routine Access Is Powering Modern Intrusions, a New Threat Report Finds — www.bleepingcomputer.com — 01.04.2026 17:05
-
RMM tool abuse occurred in 30.3% of identifiable incidents, with ScreenConnect present in over 70% of rogue RMM cases, often indistinguishable from legitimate administrative activity.
First reported: 01.04.2026 17:051 source, 1 articleShow sources
- Routine Access Is Powering Modern Intrusions, a New Threat Report Finds — www.bleepingcomputer.com — 01.04.2026 17:05
-
Fake CAPTCHA and ClickFix-style social engineering campaigns drove 57.5% of all identifiable incidents by tricking users into executing commands via the Windows Run dialog using built-in tools.
First reported: 01.04.2026 17:051 source, 1 articleShow sources
- Routine Access Is Powering Modern Intrusions, a New Threat Report Finds — www.bleepingcomputer.com — 01.04.2026 17:05
-
Adversary-in-the-Middle phishing captured authenticated session tokens post-MFA in approximately 16% of cloud account compromise cases, enabling session reuse without bypassing authentication.
First reported: 01.04.2026 17:051 source, 1 articleShow sources
- Routine Access Is Powering Modern Intrusions, a New Threat Report Finds — www.bleepingcomputer.com — 01.04.2026 17:05
-
Investigated incidents spanned multiple sectors including manufacturing, healthcare, MSPs, financial services, and construction, indicating broad applicability of observed intrusion patterns.
First reported: 01.04.2026 17:051 source, 1 articleShow sources
- Routine Access Is Powering Modern Intrusions, a New Threat Report Finds — www.bleepingcomputer.com — 01.04.2026 17:05