سامي
سامي الغامدي
مستشار Fyntralink · متاح الآن
مدعوم بالذكاء الاصطناعي · Fyntralink

VENOMOUS#HELPER RMM Phishing Campaign: Risk to SAMA Banks

A new initial-access campaign is hijacking legitimate RMM tools — SimpleHelp and ScreenConnect — to slip past EDR and establish dual-channel persistence. Here is why CISOs at SAMA-regulated banks must act this week.

F
FyntraLink Team

Securonix researchers have disclosed VENOMOUS#HELPER, a phishing operation that has compromised more than 80 organizations by weaponizing two trusted Remote Monitoring and Management (RMM) tools — SimpleHelp and ScreenConnect. For Saudi banks operating under SAMA Cyber Security Framework obligations, the campaign represents the exact blend of social engineering, signed-binary abuse, and dual-channel persistence that auditors now expect to be detected within minutes, not days.

How the VENOMOUS#HELPER Campaign Works

The infection chain begins with a phishing email impersonating the U.S. Social Security Administration, but the technique is replicable against any government brand — including ZATCA, GOSI, and Absher in the Saudi context. Victims click a link that resolves to a compromised but legitimate third-party website, which serves as a redirector that defeats reputation-based email filters and URL sandboxes. From there, a digitally signed RMM installer is delivered. Because SimpleHelp and ScreenConnect are widely deployed by IT service providers, most endpoint detection and response (EDR) baselines tolerate them by default, and behavioural rules rarely fire on first execution.

Dual-Channel Persistence: A Direct Bypass of CSCC 3.3.14

What distinguishes VENOMOUS#HELPER from prior RMM abuse is the deliberate co-installation of two distinct RMM clients on the same host. Securonix attributes this redundancy to an Initial Access Broker (IAB) or a ransomware precursor operation that wants resilient access even after blue-team intervention. The implication is direct for SAMA-regulated banks: a single allow-listed RMM tool is no longer a control — it is a liability. The Saudi Arabian Monetary Authority's Cyber Security Control Compliance Certificate (CSCC) sub-domain 3.3.14 (Cyber Security Event Logs and Audit Trails Management) and 3.3.15 (Cyber Security Incident Management) require that anomalous remote-access sessions be detected and contained, regardless of the binary's signing status.

Impact on Saudi Financial Institutions

SAMA member banks already face heightened scrutiny under the National Cybersecurity Authority's ECC-1:2018 control 2-3-3-1 (protection from email-borne malware) and the financial-sector overlay in OTCC-1:2022. An IAB campaign that hands keys to ransomware affiliates such as the recently active Everest, DragonForce, and SLH cartels — all of which have demonstrated interest in Gulf banking targets in Q1 and Q2 2026 — turns a single phished branch employee into a regulated reportable incident under SAMA's 4-hour notification window. Beyond regulatory exposure, PCI-DSS v4.0.1 requirement 5.4.1 obliges merchants and service providers to implement anti-phishing controls technically — not procedurally — making "user awareness" alone an insufficient compensating control during a QSA assessment.

Recommended Actions for Saudi CISOs

  1. Inventory every RMM agent across the estate (SimpleHelp, ScreenConnect, AnyDesk, TeamViewer, Atera, NinjaOne, Splashtop, Action1) and reconcile against a documented allow-list approved by the IT Steering Committee — this directly satisfies SAMA CSCC 3.3.6 (Application Security).
  2. Block execution of any non-approved RMM binary using AppLocker, Windows Defender Application Control, or your EDR's signed-binary policy, even when the publisher certificate is valid.
  3. Create a Sigma or KQL detection that alerts when two distinct RMM processes (e.g., SimpleHelp's Remote Access.exe and ScreenConnect's ScreenConnect.ClientService.exe) appear on the same host within a 7-day window — a near-perfect indicator of the dual-channel pattern.
  4. Egress-filter outbound RMM relay traffic at the perimeter to a known-good list of vendor cloud endpoints; everything else should be sinkholed and alerted to the SOC.
  5. Re-run phishing simulations with government-impersonation lures (ZATCA tax notices, GOSI statements, Absher verification) and measure click-through against your last quarter's baseline; update awareness modules quarterly per SAMA CSCC 3.4.4.
  6. Validate that incident response playbooks contain a specific RMM-abuse scenario, including the SAMA 4-hour reporting timeline and PDPL-aligned data-subject notification triggers.

Conclusion

VENOMOUS#HELPER is not a novel CVE — it is a reminder that the modern initial-access economy is built on tools your IT team has already approved. Defending Saudi banks now requires treating every RMM as a high-privilege application, instrumenting it with the same rigour as a domain controller, and rehearsing detection scenarios that match what attackers are actually executing this month, not last year.

Is your organization prepared? Contact Fyntralink for a complimentary SAMA Cyber Maturity Assessment, including an RMM exposure audit and a tabletop walkthrough of the VENOMOUS#HELPER kill chain mapped to CSCC and ECC controls.