Source |
Cyble |
Identifiant |
8642104 |
Date de publication |
2025-01-23 13:31:20 (vue: 2025-01-24 16:05:22) |
Titre |
CERT-UA Warns of Malicious AnyDesk Requests Under the Pretext of Phony “Security Audits” |
Texte |
>
Overview
Government entities and organizations in Ukraine are on high alert after the Computer Emergency Response Team of Ukraine (CERT-UA) uncovered a social engineering campaign targeting unsuspecting users with malicious AnyDesk requests.
The attackers are impersonating CERT-UA, a legitimate government agency, to trick victims into granting remote access to their computers using AnyDesk, a popular remote desktop application.
Here\'s a breakdown of the attack and how to stay safe:
Deceptive Tactics
Impersonation: Attackers are using the CERT-UA name, logo, and even a specific AnyDesk ID (1518341498, though this may change) to establish trust with potential victims.
Pretext for Access: The attackers claim to be conducting a "security audit" to check the level of protection on the target\'s device.
CERT-UA\'s Clarification
CERT-UA has confirmed that it may use remote access tools like AnyDesk in specific situations. However, they emphasize that such actions only occur “with prior approval” established through official communication channels.
Indicators of Compromise
Unsolicited AnyDesk connection requests, particularly those mentioning a security audit.
AnyDesk requests from users named "CERT-UA" or with the AnyDesk ID 1518341498 (be wary of variations).
Recommendations to Stay Safe
Be Wary of Unsolicited Requests: Never grant remote access to your device unless you have initiated the request and can confirm the identity of the person on the other end.
Multi-Factor Authentication: Enable multi-factor authentication on any remote access software you use for an extra layer of security.
Verification is Key: If you\'re unsure about the legitimacy of a remote access request, contact the organization the requester claims to represent through a verified communication channel (e.g., phone num |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
1518341498 about access access: actions activity: after agency alert any anydesk application approval” are attack attackers attempt audit audits” authentication authentication: breakdown campaign can cert change channel channels check claim claiming claims clarification common communication compromise computer computers conducting confirm confirmed connection contact deceptive desktop device devices disable during emergency emphasize enable encounter end engineering entities especially establish established even extra factor falling following foothold from gain geopolitical gov government grant granting harder has have heightened here high how however https://cert identity immediately impersonating impersonation impersonation: implementing indicators informed initiated key: layer legitimacy legitimate level like logo make malicious may mentioning minimize multi name named needed: never not number occur official only organization organizations other overview particularly person phone phony popular potential practices pretext prior protect protection recommendations reduce references: remote report represent request requester requests requests: response risk safe safe: security significantly situations social software specific stay staying steps strong such surface suspicious systems tactics tactics target targeting team tensions these those though through times tools trick trust ua/article/6282069 ukraine unauthorized uncovered under unless unsolicited unsure unsuspecting use users using variations verification verified victim victims warns wary website when you your “security “with |
Tags |
Tool
|
Stories |
|
Move |
|