Attack spotlight

Multi-RMM attack: Splashtop Streamer and Atera payloads delivered via Discord CDN link

July 31, 2025

Multi-RMM attack: Splashtop Streamer and Atera payloads delivered via Discord CDN link

Attack payload featuring two RMMs, one installed interactively and the other silently

Ready to see Sublime 
in action
Get a demo
Authors
Josh "Soup" Campbell
Josh "Soup" Campbell
Detection
Brandon Murphy
Brandon Murphy
Detection

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. These attacks can be prevented with a free Sublime account.

EMAIL PROVIDER: Microsoft 365

ATTACK TYPE: Malware/Ransomware

Remote Monitoring and Management (RMM) software is in every IT toolbox, and with increasing frequency, many bad actors’ too. Once an RMM has been installed maliciously, an attacker can take control of the machine to exfiltrate data, lock it down for ransom, use it as a proxy to deliver other attacks, and more, making RMMs a great way to attack or cover tracks.

In a recent attack, we saw two RMMs delivered in a single malicious payload. With two RMMs running, an attacker maintains remote control even if one RMM is discovered. This attack involved a compromised email account, OneDrive impersonation, and file extension manipulation in order to deliver the payload. Let’s take a look.

Anatomy of an attack

First, the malicious email is sent from a compromised account to an undisclosed recipient list. The message contains a link that appears to be a .docx hosted on cdn.discordapp[.]com. This message is designed to look like it’s from OneDrive, including a Word icon and a OneDrive privacy footer.

If the target clicks the link, they download a file with the same filename listed in the email, except that it ends in .msi after the .docx. If launched, the first RMM is installed and configured: Atera.

This attended install of the Atera Agent is followed by auto-configuration.

While this attended installation is going on, two silent installations are running in the background: Splashtop Streamer and .Net Runtime 8. Both of these files are downloaded directly from legitimate sources, appearing as innocuous web traffic.

Upon completion of the visible, attended installation, the attacker can now access the target machine via either Atera or Splashtop. As this attack was caught before the payload could be delivered, it’s unclear if this was going to be used for ransomware, exfiltration, or more.

Detection signals

Sublime's AI-powered detection engine prevented this attack. Some of the top signals for this attack were:

  • File extension manipulation: The message indicates the target will download a .docx file, but they are instead taken to a similarly-named .msi file.
  • OneDrive impersonation: The message is designed to look like it was send from Microsoft One Drive.
  • Free file host: The payload is hosted on the free Discord CDN, a technique seen in other attacks.
  • Undisclosed recipient list: The email is about a shared file, but has been sent to an undisclosed list of recipients rather than a specific address.

ASA, Sublime’s Autonomous Security Analyst, flagged this email as malicious. Here is ASA’s analysis summary:

Don’t let attackers control your machines

RMM attacks give bad actors a lot of ways to do bad things, so it’s important that malicious installers don’t make it into inboxes. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on seemingly minor discrepancies.

If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.

Read more Attack Spotlights:

Heading

About the authors

Josh "Soup" Campbell
Josh "Soup" Campbell
Detection

Soup is an Email Security Analyst at Sublime. With his background in InfoSec and proud membership of the SecKC community, security is both his profession and his passion. Soup was drawn to security by his need to protect people from threats and scams.

Brandon Murphy
Brandon Murphy
Detection

Brandon is a Threat Detection Engineer at Sublime. He is a seasoned cybersecurity professional with over a decade of experience protecting internet users. Prior to Sublime, Brandon put his detection engineering expertise to use as a Sr. Staff Threat Analyst at Proofpoint.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

January 6, 2026
HostPapa abuse treasure trove discovered in GoDaddy email threat hunt
Attack spotlight

HostPapa abuse treasure trove discovered in GoDaddy email threat hunt

Peter DjordjevicPerson
Peter Djordjevic
Detection
Person
December 29, 2025
5 email security trends from 2025
Sublime news

5 email security trends from 2025

Brian BaskinPerson
Brian Baskin
Threat Research
Person
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern