Hackers Exploit Remote Management Tools to Gain Initial Access to Corporate Networks