Description

Ransomware operators are increasingly misusing legitimate tools like Kickidler, an employee monitoring software, to advance their attacks. Cybersecurity firms Varonis and Synacktiv have observed ransomware affiliates from groups such as Qilin and Hunters International deploying Kickidler to conduct surveillance, record keystrokes, capture screenshots, and log administrator activity after breaching corporate networks. The attackers exploit these capabilities to harvest credentials and monitor victim behavior discreetly. Initial access in these campaigns was often achieved through malicious Google Ads impersonating legitimate software sites, including a fake RVTools website. Victims who downloaded the trojanized version of the program inadvertently launched a malware loader that delivered the SMOKEDHAM PowerShell backdoor. This backdoor facilitated the covert installation of Kickidler, enabling long-term monitoring to collect login credentials—particularly for off-site cloud backups, which are increasingly targeted by ransomware actors. Once reconnaissance was complete, attackers resumed malicious actions, launching ransomware payloads aimed at encrypting VMware ESXi virtual machines. Hunters International, for instance, used a PowerCLI script along with WinSCP to activate SSH and deploy ransomware on ESXi servers, causing significant operational disruption. These attacks demonstrate the advanced planning and persistence behind modern ransomware campaigns. While remote monitoring software like Kickidler is not commonly associated with ransomware, threat actors have long abused RMM tools to bypass system protections. Security agencies recommend regularly auditing installed remote access software, limiting use to authorized tools, enforcing strict application control policies, and blocking unused RMM ports. These steps can help reduce the risk of similar intrusions and protect critical infrastructure from exploitation.