BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Social Security Phishing Campaign Deploys Datto RMM for Remote PC Takeover

Social Security Phishing Campaign Deploys Datto RMM for Remote PC Takeover

March 8, 2026Malware & Threats2 min readmedium

Originally reported by Hackread

#phishing#social-engineering#remote-access-trojan#tax-fraud#datto-rmm
Share

TL;DR

A phishing campaign is targeting US recipients with fake Social Security Administration emails containing fraudulent tax documents. The attack uses legitimate Datto RMM software to gain persistent remote access to compromised systems.

Why medium?

New phishing campaign targeting US victims with remote access capabilities, but no evidence of widespread deployment or critical infrastructure impact.

Campaign Overview

Threat actors are leveraging fake Social Security Administration communications to distribute remote access tools, according to research shared with Hackread. The campaign uses fraudulent 2025 and 2026 tax statement documents as lures to convince targets to install legitimate remote monitoring and management (RMM) software.

Attack Vector Details

The phishing emails impersonate official SSA correspondence and reference tax documentation to establish credibility with recipients. Once victims engage with the malicious content, attackers guide them through installing Datto RMM software under false pretenses.

Datto RMM, a legitimate IT management platform, becomes the attack vector for persistent system access. The software's remote control capabilities allow threat actors to:

  • Execute commands remotely
  • Access files and credentials
  • Install additional malware
  • Monitor user activity
  • Maintain persistence across reboots

Timing and Targeting

The campaign's timing coincides with tax season, when recipients expect to receive legitimate tax-related communications from government agencies. This social engineering approach increases the likelihood of successful compromise by exploiting seasonal expectations.

The targeting appears focused on US-based individuals, leveraging the universal recognition of Social Security Administration branding and tax document expectations.

Detection and Mitigation

Organizations should implement email filtering rules to detect SSA impersonation attempts and monitor for unauthorized RMM tool installations. Security teams should establish baselines for legitimate remote access tools and alert on unexpected deployments.

End users should verify any unexpected government communications through official channels before downloading attachments or following embedded links. Legitimate SSA communications typically arrive via postal mail rather than email for sensitive tax documentation.

Sources

  • https://hackread.com/social-security-scam-emails-fake-tax-doc-hijack-pc/

Originally reported by Hackread

Tags

#phishing#social-engineering#remote-access-trojan#tax-fraud#datto-rmm

Related Intelligence

  • Privacy Settlement, Phishing Evolution, and Weekly Threat Intel Roundup

    mediumMar 2, 2026
  • Weekly Threat Roundup: EU Court Shifts Phishing Liability, New .arpa Evasion Techniques Emerge

    mediumMar 9, 2026
  • Microsoft: Threat Actors Weaponizing AI Across Full Attack Chain

    mediumMar 8, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Trojanized Red Alert App Targets Israeli Users via Fake Government SMS

Next Article

Prediction Markets Create New Vector for National Security Information Leaks →