Crazy Ransomware Gang Abuses Employee Monitoring Tool to Stay Hidden Inside Corporate Networks


Cybersecurity researchers have confirmed that a member of the Crazy ransomware gang abused legitimate employee monitoring software and a remote support tool to maintain persistence inside breached corporate environments. The attackers used trusted administrative tools instead of traditional malware to avoid detection and quietly prepare for ransomware deployment.

The activity was uncovered by researchers at Huntress, who investigated multiple intrusions where threat actors installed Net Monitor for Employees Professional alongside the SimpleHelp remote support client. By blending malicious actions with legitimate IT activity, the attackers maintained hands-on control over compromised systems for extended periods.

According to Huntress, the same operator appears responsible for at least two observed incidents, based on overlapping infrastructure and reused filenames.

What Happened in the Attacks

In both cases, attackers gained initial access using compromised credentials, including SSL VPN accounts. Once inside, they did not immediately deploy ransomware. Instead, they installed legitimate software to quietly control the network and monitor activity.

The primary tools abused were:

  • Net Monitor for Employees Professional
  • SimpleHelp remote support client

These programs are designed for legitimate administrative and workforce monitoring purposes. However, when installed by attackers, they effectively function as remote access trojans.

Official Statements From Huntress

On how the monitoring tool was weaponized:

“Net Monitor for Employees Professional… bundles a pseudo-terminal (winpty-agent.exe) that enables full command execution. Threat actors leveraged this capability for hands-on-keyboard reconnaissance… effectively turning an employee monitoring tool into a fully functional RAT.”

On evidence linking the intrusions to the same operator:

“The same filename (vhost.exe) and overlapping C2 infrastructure were reused across both cases, strongly suggesting a single operator or group behind both intrusions.”

On cryptocurrency monitoring configured by attackers:

“The SimpleHelp agent… was configured with keyword-based monitoring triggers targeting cryptocurrency wallets, exchanges, blockchain explorers, and payment platforms…”

How the Attack Chain Worked

The intrusions followed a structured pattern.

1. Initial Access : Attackers entered the network using stolen or compromised VPN credentials.

2. Deployment of Monitoring Software: They installed Net Monitor for Employees Professional using standard Windows installation methods such as msiexec.exe. This allowed them to:

  • Perform reconnaissance
  • View desktops in real time
  • Execute system commands
  • Transfer files

3. Redundant Remote Access: To ensure persistence, the attackers installed SimpleHelp via PowerShell. In some cases, the executable was disguised using filenames such as:

C:\ProgramData\OneDriveSvc\OneDriveSvc.exe

This naming tactic helped the malicious software blend in with legitimate services.

4. Surveillance and Preparation: The attackers configured monitoring rules inside SimpleHelp to track:

  • Cryptocurrency wallet keywords
  • Exchange platforms like Binance and KuCoin
  • Blockchain explorers
  • Remote access tools such as RDP and TeamViewer

This suggests preparation for ransomware deployment and potential cryptocurrency theft.

5. Ransomware Deployment: In at least one incident, the attackers proceeded to deploy the Crazy ransomware payload.

Tools Abused in the Intrusions

ToolLegitimate UseHow It Was Abused
Net Monitor for Employees ProfessionalWorkforce monitoringCommand execution and remote control
SimpleHelpIT remote supportPersistent backdoor access
Windows Installer (msiexec.exe)Software installationSilent deployment of monitoring agent
PowerShellAdministrative automationInstallation of disguised remote client

Why Attackers Prefer Legitimate Tools

The abuse of legitimate software has become a growing trend in ransomware operations. Instead of dropping obvious malware, attackers use trusted administrative tools to reduce detection risk.

Benefits for attackers include:

  • Blending into normal IT traffic
  • Avoiding traditional antivirus detection
  • Maintaining redundant access points
  • Reducing forensic indicators

This approach is sometimes called “living off the land” because it relies on legitimate tools already trusted within corporate environments.

Security Recommendations From Huntress

Huntress advises organizations to strengthen defensive measures, especially around remote access.

Access Controls

  • Enforce Multi-Factor Authentication on all VPN and remote services
  • Limit administrative privileges

Monitoring and Detection

  • Audit installations of remote monitoring and RMM tools
  • Alert on unauthorized installation of employee monitoring software
  • Monitor unusual PowerShell execution

Network Security

  • Investigate outbound traffic linked to unknown monitoring tools
  • Track suspicious filenames such as vhost.exe

Organizations should treat remote management tools as high-risk assets that require strict oversight.

Frequently Asked Questions

What is the Crazy ransomware gang?

Crazy is a ransomware operation observed deploying file-encrypting malware after establishing persistent access inside victim networks.

How did the attackers initially gain access?

The breaches were enabled through compromised SSL VPN credentials.

Why didn’t antivirus stop this activity?

The attackers used legitimate, signed administrative software rather than traditional malware, allowing them to evade standard detection methods.

Did both incidents result in ransomware deployment?

Only one confirmed case led to ransomware execution, but infrastructure overlaps suggest the same operator was involved in both.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages