Cybercriminals Weaponize Velociraptor DFIR Tool for Remote Access

Cybercriminals weaponized Velociraptor, an open-source DFIR tool, for unauthorized remote access by deploying agents to execute VS Code with tunneling via Cloudflare, mimicking legitimate tasks. This evolves from RMM abuses, blurring defensive lines. Security teams must implement behavioral analytics and zero-trust measures to counter such threats.
Cybercriminals Weaponize Velociraptor DFIR Tool for Remote Access
Written by John Marshall

In the ever-evolving cat-and-mouse game of cybersecurity, threat actors are increasingly turning legitimate tools against their creators. A recent incident uncovered by researchers highlights how an open-source incident response tool, Velociraptor, is being weaponized for unauthorized remote access, marking a sophisticated shift in attack methodologies.

Developed by Rapid7 as a powerful digital forensics and incident response (DFIR) platform, Velociraptor allows security teams to query endpoints, collect artifacts, and hunt for threats using its proprietary Velociraptor Query Language (VQL). But in a twist detailed in a Sophos News report published on August 26, 2025, cybercriminals deployed the tool not for defense, but to establish persistent access within a targeted network.

The Mechanics of the Abuse

The attack began with the deployment of Velociraptor’s agent on compromised endpoints, masquerading as a benign investigative process. Attackers then leveraged the tool’s capabilities to download and execute Visual Studio Code (VS Code), a popular code editor, which they configured with tunneling extensions to create covert command-and-control (C2) channels. This allowed remote code execution without raising immediate alarms, as the activity blended seamlessly with legitimate administrative tasks.

According to the same Sophos analysis, the perpetrators routed their communications through Cloudflare Workers domains, further obfuscating their presence. This method represents an evolution from earlier tactics where threat actors abused remote monitoring and management (RMM) tools like TeamViewer or AnyDesk, as noted in prior industry reports. By co-opting a DFIR tool designed for threat hunting, attackers are essentially using defenders’ own weapons against them, complicating detection efforts.

Implications for Incident Response Teams

Security professionals have long relied on tools like Velociraptor for rapid endpoint visibility, as emphasized in a Medium article by Nived Sawant from June 2024, which praises its VQL for efficient data collection. However, this incident underscores the double-edged nature of open-source software: its accessibility empowers both blue teams and red teams alike.

In the August 2025 case, the intrusion was halted by alerts from Sophos’ Taegis platform, which detected anomalous behavior before ransomware could deploy. Yet, the broader trend signals a need for enhanced monitoring of tool deployments. Posts on X (formerly Twitter) from cybersecurity accounts like Adam Goss on August 27, 2025, echo this concern, highlighting how such abuses shift focus from RMM exploitation to DFIR weaponization, potentially eroding trust in essential security utilities.

Evolving Defenses Against Tool Misuse

To counter these threats, organizations must implement stricter controls, such as behavioral analytics and zero-trust verification for tool executions. As detailed in a Help Net Security overview from August 2023, Velociraptor’s strength lies in its endpoint insights, but without safeguards, it becomes a liability.

Industry insiders suggest integrating multi-factor authentication for tool access and regular audits of open-source dependencies. Sophos’ findings also align with patterns seen in their 2024 Active Adversary Report, referenced in a KBI.Media article from April 2024, where remote desktop protocol abuses dominated intrusions. This latest abuse of Velociraptor could inspire copycat attacks, urging firms to reassess their incident response arsenals.

Looking Ahead: A Call for Vigilance

As cyber threats grow more insidious, the line between defensive tools and offensive vectors blurs. The Sophos investigation serves as a stark reminder that innovation in security must be matched by proactive risk management.

Ultimately, fostering collaboration between tool developers and threat intelligence communities—perhaps through shared vulnerability disclosures—could mitigate these risks. For now, the incident reinforces a fundamental truth: in cybersecurity, even the guardians can be turned into gateways if not carefully watched.

Subscribe for Updates

ITProNews Newsletter

News & trends for IT leaders and professionals.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us