Explore tweets tagged as #SimpleHelp
@sabatage
SabatAge
4 months
Ransomware Gangs exploit unpatched SimpleHelp RMM flaws to target victims with double extortion
1
1
1
@0xBurgers
0xBurgers
3 months
Simplehelp Rogue RMM is so hot right now. Nothing suspicious about your zodiac and social security information.
4
4
16
@0x534c
Steven Lim
1 month
🚨 Sliver Backdoor via SimpleHelp RMM Threat actors are actively exploiting vulnerabilities in SimpleHelp RMM to deploy the Sliver backdoor, enabling lateral access into downstream customer environments. This campaign has been ongoing since January 2025 and shows no signs of
0
15
50
@TechNadu
TechNadu
16 days
🚨 Zero-day alert: CVE-2025-10035 in GoAnywhere MFT actively exploited ⚠️ Exploitation began before Fortra’s disclosure ⚠️ Attackers: RCE, admin-go backdoor, payloads (zato_be.exe, jwunst.exe) ⚠️ Persistence via SimpleHelp abuse Admins: patch to 7.8.4 or 7.6.3 ASAP + check logs
0
0
0
@RealTryHackMe
TryHackMe
6 months
NEW RECENT THREAT: SimpleHelp: CVE-2024-57727 🔗 https://t.co/BUZTKJh2Jp Explore how attackers can exploit SimpleHelp's CVE-2024-57727 on Windows and Linux hosts. Learn to detect such exploitation manually and via ELK, Splunk, and Snort. 🛟 🔌
0
13
89
@Cloudforce_One
Cloudforce One
13 days
Cloudflare has rolled out new WAF rules to protect against: ->SimpleHelp Auth Bypass (CVE-2024-57727) ->Flowise Cloud Info Disclosure (CVE-2025-58434) ->WordPress Ditty Plugin SSRF (CVE-2025-8085) ->Vite Directory Traversal (CVE-2025-30208)
1
1
7
@HunterMapping
Hunter
9 months
🚨Alert🚨 CVE-2024-57727&&CVE-2024-57728&&CVE-2024-57726 : Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks 📊 75k+ Services are found on https://t.co/ysWb28Crld yearly. 🔗Hunter Link: https://t.co/LxDmNVsdm9 👇Query HUNTER
0
3
22
@t_nihonmatsu
二本松哲也
4 months
こんばんは、いかがお過ごしでしょうか 「今宵のサイバーセキュリティー」 注目トピックは、SimpleHelp RMMやWazuhのゼロデイ脆弱性が悪用され、公共インフラやSIEM基盤にまで影響。“静かに広がる侵入”が可視化されました。
1
1
10
@yousukezan
yousukezan
27 days
高度なフィッシング作戦で攻撃者がITarian、PDQ Connect、SimpleHelp、AteraといったRMM(リモート監視管理)ツールを悪用し、被害端末へ持続的なリモートアクセ��を確立していることが明らかになった。 Red
0
1
6
@TechNadu
TechNadu
30 days
🚨 Phishing + Malware = A dangerous new combo. Cofense reports threat actors are pairing Muck Stealer, Info Stealer, ConnectWise RAT & SimpleHelp RAT with fake logins. ⚡️Dual-threat = harder to defend. ⚡️Adaptive payloads (@Windows vs @Android). Will layered security hold up?
0
0
0
@CISACyber
CISA Cyber
4 months
🚨Ransomware actors exploited an unpatched vulnerability (CVE-2024-57727) in SimpleHelp RMM to compromise a utility billing software provider—part of a pattern of actors targeting downstream customers. See our advisory for mitigations👉 https://t.co/Yli2jWTtOw
8
51
129
@CISAgov
Cybersecurity and Infrastructure Security Agency
4 months
🚨Ransomware actors are using an unpatched SimpleHelp RMM vulnerability to exploit & compromise a utility billing software provider. We urge software vendors & MSPs to implement recommended mitigations immediately to protect your systems. More here👉 https://t.co/b8aUFCEIUd
5
27
50
@TheHackersNews
The Hacker News
4 months
🚨 Ransomware gangs are exploiting unpatched SimpleHelp flaws to hit utility billing customers with double extortion attacks — since Jan 2025. CISA warns: patch now or risk serious breaches. Read → https://t.co/cjzkQIia0q Meanwhile, new Fog ransomware uses legit employee
1
28
70
@SSuiteSoftware
SSuite Office Software
5 months
DragonForce #ransomware abuses SimpleHelp in MSP supply chain attack The #DragonForce operation breached a managed service provider and used its #SimpleHelp remote monitoring platform to steal data and deploy #encryptors! 🔥🕵️‍♂️ #CyberSecurity #TechNews https://t.co/LjDs2Mn46Y
0
0
2
@gothburz
Petrus Germanicus
4 months
Play ransomware has targeted over 900 organizations, leveraging a SimpleHelp flaw (CVE-2024-57727) for double-extortion schemes. Victims receive ransom notes with no initial demands, only contact emails. The group employs EDR killers to disable security and recompiles malware for
0
0
0
@BleepinComputer
BleepingComputer
5 months
DragonForce ransomware abuses MSP’s SimpleHelp RMM to encrypt customers - @LawrenceAbrams https://t.co/jxtLbkUneV https://t.co/jxtLbkUneV
0
18
63
@rtehrani
Rich Tehrani
9 months
Hackers exploiting flaws in SimpleHelp RMM to breach networks
0
0
0
@zoomeye_team
ZoomEye
4 months
🚨Ransomware Alert🚨Threat actors are exploiting CVE-2024-57727 in unpatched SimpleHelp RMM to target utility billing providers & MSPs! They’re using this flaw to snag credentials, escalate privileges, and unleash double extortion ransomware attacks. ZoomEye
@CISACyber
CISA Cyber
4 months
🚨Ransomware actors exploited an unpatched vulnerability (CVE-2024-57727) in SimpleHelp RMM to compromise a utility billing software provider—part of a pattern of actors targeting downstream customers. See our advisory for mitigations👉 https://t.co/Yli2jWTtOw
0
1
9
@HackRead
Hackread.com
1 month
Watch out as hackers are using dual-threat attacks combining phishing, Muck Stealer, Info Stealer, ConnectWise RAT, and SimpleHelp RAT to steal data and bypass security. Read: https://t.co/tICFSc5jxF #CyberSecurity #Malware #Phishing #Scam #InfoSec
1
2
6