“Keys to the Kingdom”: How Bomgar RMM Flaws Unleashed a Supply Chain Cyberstorm
A wave of attacks exploiting a critical Bomgar vulnerability exposes the fragile trust at the heart of IT supply chains.
When a single server can unlock access to hundreds of companies, the stakes of cybersecurity grow exponentially. In the last two weeks, attackers have seized on a newly disclosed flaw in Bomgar’s Remote Support platform - now part of BeyondTrust - demonstrating how quickly a vulnerability can ripple through the digital supply chain, leaving devastation in its wake.
Fast Facts
- Critical Bomgar RMM vulnerability (CVE-2026-1731) exploited in multiple recent attacks.
- Attackers gained unauthenticated remote code execution, giving full control of targeted systems.
- Incidents led to ransomware deployments (notably LockBit), privilege escalations, and lateral movement.
- Supply chain impact: breaches at service providers spread rapidly to dozens of downstream clients.
- Experts urge immediate patching, vigilant monitoring for rogue admin accounts and RMM deployments.
The Domino Effect: From a Single Breach to Mass Compromise
Researchers at Huntress Security sounded the alarm after observing a "sharp uptick" in exploitation of Bomgar Remote Support instances. Threat actors are leveraging CVE-2026-1731 - a critical remote code execution flaw - to gain unauthenticated access to vulnerable servers. Once inside, attackers can move laterally, escalate privileges, and deploy additional remote management tools, such as AnyDesk and Atera, to maintain persistent access.
One April attack on a dental software company quickly spread to three of its customers. Another incident compromised a managed service provider (MSP), resulting in the isolation of 78 businesses and successful exploitation of four more downstream organizations. “Targeting the server running the RMM appliance is like getting the key to the city,” says Huntress analyst Josh Allman. The compromise of a single upstream system can cascade across the entire client base - a chilling prospect for any organization relying on third-party IT services.
Ransomware operators, including those wielding the infamous LockBit strain, have seized the opportunity. In several cases, attackers used leaked LockBit 3.0 tools to encrypt victim networks. However, not all attacks immediately deployed ransomware; some focused on reconnaissance and establishing new administrator accounts, laying the groundwork for future campaigns.
This new wave underscores a broader trend: attackers increasingly exploit legitimate IT tools - like RMMs - instead of traditional malware, making detection harder and maximizing reach. By “living off the land,” threat actors blend into normal network activity, evading many security tools that look for more conventional threats.
Defensive Imperatives
With the attack vector known and actively exploited, experts urge organizations to patch Bomgar systems without delay. Monitoring for suspicious administrator accounts, unexpected RMM deployments, and anomalous Bomgar activity is critical. As attackers grow more sophisticated, defenders must adapt, ensuring that the very tools meant to enable secure support don’t become the keys to the kingdom for cybercriminals.
Looking Ahead
The Bomgar incident is a sobering reminder: in today’s interconnected IT landscape, a single weak link can threaten the entire chain. As attackers refine their tactics, vigilance, rapid patching, and proactive monitoring are not just best practices - they are necessities for survival.
WIKICROOK
- Remote Monitoring and Management (RMM): Remote Monitoring and Management (RMM) are IT tools that let professionals remotely control, monitor, and maintain computers - helpful for support, but risky if misused.
- Remote Code Execution (RCE): Remote Code Execution (RCE) is when an attacker runs their own code on a victim’s system, often leading to full control or compromise of that system.
- Privilege Escalation: Privilege escalation occurs when an attacker gains higher-level access, moving from a regular user account to administrator privileges on a system or network.
- Lateral Movement: Lateral movement is when attackers, after breaching a network, move sideways to access more systems or sensitive data, expanding their control and reach.
- Indicators of Compromise (IOCs): Indicators of Compromise (IoCs) are clues like filenames, IPs, or code fragments that help detect if a computer system has been breached.