
A number of vulnerabilities (CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728) enabled attackers to upload and download files and escalate privileges to the admin level. The problem was recently discovered by Horizon3, which prompted SimpleHelp to release patches and fixed versions 5.5.8, 5.4.10, and 5.3.9.
But according to Arctic Wolf, attackers have already begun exploiting new bugs. A malicious campaign targeting SimpleHelp servers was launched a week after the publication of the Horizon3 security bulletin.
“While it is not confirmed that the recently disclosed vulnerabilities are responsible for the observed campaign, Arctic Wolf strongly recommends upgrading to the latest available fixed versions of the SimpleHelp server software where possible.”
Arctic Wolf analysts found out that the SimpleHelp Remote Access.exe process was running in the background on affected devices prior to the attack for a previous support session from a third-party vendor.
The first sign of compromise were communications between the SimpleHelp client on the target device and a third-party SimpleHelp server. Apparently, the attackers used vulnerabilities in SimpleHelp to gain control over the client or used stolen credentials.
After gaining access to the organization, the attackers used such tools as net
and nltest
to collect information on its accounts, groups, shares, and domain controllers, and also to test connectivity to Active Directory.
According to experts, these are the standard steps preceding privilege escalation and lateral movement. However, the malicious session was terminated before it was possible to figure out further plans of the attackers.
According to The Shadowserver Foundation, some 580 vulnerable SimpleHelp instances are currently available online; most of them (345) are located in the United States.


2025.01.23 — Fake Telegram CAPTCHA forces users to run malicious PowerShell scripts
Hackers used the news of Ross Ulbricht pardoning to lure users to a rogue Telegram channel where they are tricked into running malicious PowerShell code. This…
Full article →
2025.02.08 — Hackers exploit RCE vulnerability in Microsoft Outlook
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned Federal Civilian Executive Branch (FCEB) Agencies that they have to secure their systems from ongoing…
Full article →
2025.04.12 — Hackers compromised a bureau within the U.S. Department of the Treasury and spent months in hacked systems
The Office of the Comptroller of the Currency (OCC), an independent bureau within the United States Department of the Treasury, reported a major cybersecurity incident. Unknown attackers had…
Full article →
2025.03.16 — Researchers force DeepSeek to write malware
According to Tenable, the AI chatbot DeepSeek R1 from China can be used to write malware (e.g. keyloggers and ransomware). DeepSeek was released in January 2025 and caused a stir…
Full article →
2025.04.15 — Hackers exploit authentication bypass bug in OttoKit WordPress plugin
Hackers exploit an authentication bypass vulnerability in the OttoKit (formerly SureTriggers) WordPress plugin used by more than 100,000 websites. First attacks were recorded just…
Full article →
2025.01.25 — 18,000 script kiddies have been infected with backdoor via XWorm RAT builder
According to CloudSEK analysts, malefactors attack novice hackers using a fake malware builder. Script kiddies' systems become infected with a backdoor that steals data and subsequently…
Full article →
2025.03.10 — Nearly a million Windows computers impacted by a malvertising campaign
According to Microsoft, nearly 1 million Windows devices fell victim to a sophisticated malvertising campaign in recent months. Cybercriminals were able to steal credentials, cryptocurrency, and sensitive…
Full article →
2025.03.24 — Alexa to stop processing data locally. All voice requests will be sent to Amazon Cloud
Amazon announced that the privacy option allowing users of Echo speakers to avoid sending their voice recordings to the company's cloud will no longer be supported. Effective March…
Full article →
2025.04.23 — Improper authentication control vulnerability affects ASUS routers with AiCloud
ASUSTeK Computer Inc. fixed an improper authentication control vulnerability in routers with AiCloud. The bug allows remote attackers to perform unauthorized actions on vulnerable devices. The issue…
Full article →
2025.04.16 — Android devices will restart every three days to protect user data
Google introduces a new security feature for Android devices: locked and unused devices will be automatically restarted after three days of inactivity to return their memory to an…
Full article →