@patrickcmiller I loved this quote from the article:
> Less frequently, attackers try to trick prospective targets into installing RMM tools through spear-phishing attacks.
Imagine being so confident to spear-phish someone to get their organization to install RMM tools so that you can more easily hack them later XD