Attackers use remote monitoring and management tools at MSPs to gain unfettered access to target networks.