Remote Access or Remote Risk? What RMM Vulnerabilities Mean for Your Decommissioning Process

Aug 29, 2025

Remote Monitoring and Management (RMM) tools are built for convenience—letting IT teams troubleshoot and support systems from anywhere. But when those same tools are left unpatched or forgotten on dormant systems, they can quietly become high-value entry points for ransomware actors.

CISA recently issued an advisory confirming that ransomware groups are actively exploiting unpatched versions of one such tool, SimpleHelp, to compromise a utility billing software provider and its downstream customers. These are not hypothetical risks—they’re active threats with real-world impacts across supply chains and critical infrastructure.

Earlier this year, the vulnerability—CVE-2024-57727—was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. It affects SimpleHelp version 5.5.7 and earlier. Many organizations may not realize the software is still running—especially when it’s embedded in third-party vendor tools or left behind on unused equipment.

Dormant Systems, Active Threats

The issue isn’t just about patching live systems. Risk often lingers in retired servers, unused laptops, or vendor-managed software with outdated remote access tools still in place.

At SEAM in Sioux Falls, we regularly receive equipment from South Dakota, North Dakota, Iowa, and beyond that still has active services running—even after it’s been taken off the network. Just because a system is unplugged doesn’t mean it’s secure. If it’s powered back on or has active credentials, it could become a quiet access point for attackers.

What to Check for SimpleHelp Exploits

CISA recommends the following actions to reduce risk:

  • Update SimpleHelp immediately if running version 5.5.7 or earlier.
  • Audit all devices—especially older or decommissioned ones—for remote access services.
  • Look for signs of compromise, such as executables like aaa.exe or bbb.exe created after January 2025.
  • Isolate vulnerable servers from the internet if they can’t be patched right away.
  • Monitor traffic for unusual activity coming from SimpleHelp systems.

They also advise keeping clear communication channels with your vendors and maintaining a current inventory of all hardware and software in use—especially third-party tools.

Why Secure ITAD Still Matters

Events like this reinforce why IT asset disposition (ITAD) is more than just recycling—it’s risk mitigation. Unused devices with old software still pose a threat if they aren’t fully sanitized before being retired.

At SEAM, our certified ITAD process includes:

  1. Secure data destruction (digital and physical)
  2. Removal of lingering access agents like RMM tools
  3. Detailed chain-of-custody reporting for compliance and auditing

This process helps protect your organization from residual risk while meeting data security standards.

Organizations across the Midwest—especially in healthcare, education, finance, and government—should revisit their offboarding and retirement procedures. The tools meant to help manage systems securely can become threats when left behind.

If you’re reviewing your cyber hygiene strategy, make sure your old infrastructure isn’t the weakest link.

SEAM works with organizations across Sioux Falls and the surrounding region to securely decommission retired IT equipment. Contact us to learn how our certified ITAD services can reduce long-term security exposure.

Levi Hentges is the Vice President / Development at SEAM. He helps clients build and manage their IT Asset Disposition (ITAD) programs to comply with legal, corporate and environmental requirements surrounding their technology devices; including asset recovery and resale, data destruction and secure electronics recycling.