Detected a new data theft campaign targeting AnyDesk users
International security researchers are currently closely monitoring the activities of a hacker group specializing in data theft and extortion called Mad Liberator. This group of hackers is currently actively deploying a malicious attack campaign targeting users of the AnyDesk remote computer access application, with the act of running fake Microsoft Windows update screens to distract while stealing. data from the target device.
Targeted at AnyDesk users
According to a report from cybersecurity company Sophos, researchers say the Mad Liberator attack begins with an unwanted connection to a computer using AnyDesk, an application that supports remote computer access today. Very commonly used in IT groups managing corporate environments.
It's unclear how hackers choose targets, but one theory that's getting a lot of consensus is that Mad Liberator will try potential addresses (AnyDesk connection ID) until someone accepts the connection request. .
Once the connection request is approved, the attacker drops a binary file named Microsoft Windows Update onto the compromised system, displaying a fake Windows Update welcome screen.
The sole purpose of this scam is to distract victims while the attacker uses AnyDesk's File Transfer tool to steal data from OneDrive accounts, network shares, and local storage.
During the fake Windows update screen, the victim's keyboard will be disabled to avoid interrupting the data extraction process.
In the attacks Sophos detected that lasted about four hours, Mad Liberator did not perform any data encryption in the post-leak period. However, they still send ransom notes on shared network folders to ensure maximum visibility in corporate environments.
Sophos noted that it did not see Mad Liberator interact with the target before requesting an AnyDesk connection, and did not observe any phishing attempts in support of the attack.
Regarding Mad Liberator's extortion process, the hacker group states on their darknet site that they will first contact the compromised companies to offer "help" to fix security issues and restore files are encrypted if their monetary requirements are met.
If the victimized company does not respond within 24 hours, their name will be published on the extortion portal and given seven days to contact the threat actors.
After another five days of the ultimatum being issued with no ransom being paid, all the stolen files were published on the Mad Liberator website, which now has nine victims.
You should read it
- What is AnyDesk? Differences between AnyDesk and TeamViewer
- How to install and use AnyDesk on Linux
- How to control a remote computer by phone with AnyDesk Remote
- How to use AnyDesk Remote to control remote computers
- How to control a remote computer with AnyDesk Remote
- Invite to download and experience AnyDesk Remote, a free application that supports remote control of smartphones for smartphones
- NASA launched the application to help users take selfie photos in space, invite experience
- Horror cases of living with corpses
May be interested
- Why do many people prefer the Pixel 9 Pro XL over the Pixel 9 Pro?for the first time, google's pixel line includes a pro model and a pro xl model. they have similar specifications but different sizes. however, many people prefer the pixel 9 pro xl because the larger size offers several advantages.
- 16 popular AI 'undressing' websites on the Internet are sued16 websites that allow posting pictures of real people so that deepfake ai models can create pornographic photos are considered to have the most traffic, and have just been sued by the san francisco city prosecutor's office with the goal of shutting down these sites. this website.
- This tool will help bring iOS-specific applications to Androidskip was created to enable existing ios app developers to create native android apps
- Laptop automatically stops charging when playing games - Fast processinglaptops automatically disconnect charging while playing games, which is an extremely annoying problem. to keep the game playing process uninterrupted, see the article to fix the error now!
- Excel 2016 - Lesson 3: How to create new and open existing spreadsheetshow to create excel files on a computer is not difficult. below are detailed instructions on how to create excel files and open spreadsheets for beginners.
- PowerPoint 2016: Arrange and group objectsusers can arrange objects on the slide as desired by aligning, ordering, grouping, and rotating them in many different ways.