Detected a new data theft campaign targeting AnyDesk users
International security researchers are currently closely monitoring the activities of a hacker group specializing in data theft and extortion called Mad Liberator. This group of hackers is currently actively deploying a malicious attack campaign targeting users of the AnyDesk remote computer access application, with the act of running fake Microsoft Windows update screens to distract while stealing. data from the target device.
Targeted at AnyDesk users
According to a report from cybersecurity company Sophos, researchers say the Mad Liberator attack begins with an unwanted connection to a computer using AnyDesk, an application that supports remote computer access today. Very commonly used in IT groups managing corporate environments.
It's unclear how hackers choose targets, but one theory that's getting a lot of consensus is that Mad Liberator will try potential addresses (AnyDesk connection ID) until someone accepts the connection request. .
Once the connection request is approved, the attacker drops a binary file named Microsoft Windows Update onto the compromised system, displaying a fake Windows Update welcome screen.
The sole purpose of this scam is to distract victims while the attacker uses AnyDesk's File Transfer tool to steal data from OneDrive accounts, network shares, and local storage.
During the fake Windows update screen, the victim's keyboard will be disabled to avoid interrupting the data extraction process.
In the attacks Sophos detected that lasted about four hours, Mad Liberator did not perform any data encryption in the post-leak period. However, they still send ransom notes on shared network folders to ensure maximum visibility in corporate environments.
Sophos noted that it did not see Mad Liberator interact with the target before requesting an AnyDesk connection, and did not observe any phishing attempts in support of the attack.
Regarding Mad Liberator's extortion process, the hacker group states on their darknet site that they will first contact the compromised companies to offer "help" to fix security issues and restore files are encrypted if their monetary requirements are met.
If the victimized company does not respond within 24 hours, their name will be published on the extortion portal and given seven days to contact the threat actors.
After another five days of the ultimatum being issued with no ransom being paid, all the stolen files were published on the Mad Liberator website, which now has nine victims.
You should read it
- What is AnyDesk? Differences between AnyDesk and TeamViewer
- How to install and use AnyDesk on Linux
- How to control a remote computer by phone with AnyDesk Remote
- How to use AnyDesk Remote to control remote computers
- How to control a remote computer with AnyDesk Remote
- Invite to download and experience AnyDesk Remote, a free application that supports remote control of smartphones for smartphones
- NASA launched the application to help users take selfie photos in space, invite experience
- Horror cases of living with corpses
May be interested
- Remcos Alert: Ingenious Excel Phishing Campaign Spreading Dangerous Fileless Malwareexcel users need to be on guard as a newly discovered phishing campaign is targeting microsoft's spreadsheet application.
- GoldBrute botnet campaign is trying to hack 1.5 million RDP servers worldwidenew security researchers discover an ongoing sophisticated botnet campaign, using brute-force methods targeting more than 1.5 million publicly accessible windows rdp servers on the internet.
- Invite to download and experience AnyDesk Remote, a free application that supports remote control of smartphones for smartphonesanydesk remote is a remote support tool for accessing, connecting and controlling computers (windows, mac) for smartphones, allowing users to share content on a computer / mobile screen, entertainment support (music playback, video), keyboard and mouse control, file search ... data transfer between two computers.
- What is data exfiltration? How to prevent this dangerous behavior?data exfiltration also has other ways of calling data theft (data theft), or data exportation (unauthorized data export).
- How to control a remote computer by phone with AnyDesk Remoteanydesk is a remote control software with fast speed and multi-platform support (windows, ios, android). if you are using anydesk for the first time to control your computer, please read the instructions below!
- Kaspersky accused the APT32 hacker group of using the Google Play Store to spread spyware for yearskaspersky security researchers found a malicious campaign called phantomlance targeting android device users.
- Microsoft warns of phishing campaigns targeting Outlook Web App and Office 365 usersmicrosoft security experts issue an important warning about an ongoing large-scale phishing, targeting outlook web app (owa) services and office 365.
- How to control a remote computer with AnyDesk Remoteanydesk remote software links two remote computers and comes with content data transfer options.
- Discover a new offensive campaign, targeting iPhone users with iOS 12.2 and belowby deceiving users into accessing fake web sites, malicious code on it will crack iphone and allow hackers to record calls and sounds, eavesdrop on user messages.
- Phishing campaign via email, abusing Microsoft Office templates to spread malicious codea new phishing campaign is targeting us organizations with the aim of deploying the netsupport rat remote access trojan and is being tracked by israeli security firm perception point as operation phantomblu…