Hackers use AnyDesk in safe mode to launch attacks: Report : The Tribune India

Join Whatsapp Channel

Hackers use AnyDesk in safe mode to launch attacks: Report

Hackers use AnyDesk in safe mode to launch attacks: Report

For representation only.



New Delhi, December 27

Sophos, a global leader in cybersecurity, on Monday revealed that hackers attempted to bypass security controls by using a combination of Windows Safe Mode and the AnyDesk remote administration tool.

Windows Safe Mode is an IT support method for resolving IT issues that disables most security and IT administration tools, while AnyDesk provides continuous remote access.

"Sophos discovered that the AvosLocker attackers installed AnyDesk so it works in Safe Mode, tried to disable the components of security solutions that run in Safe Mode, and then ran the ransomware in Safe Mode. This creates a scenario where the attackers have full remote control over every machine they've set up with AnyDesk, while the target organization is likely locked out of remote access to those computers. Sophos has never seen some of these components used with ransomware, and certainly not together," Peter Mackenzie, director of incident response at Sophos, said in a statement.

AvosLocker is a relatively new ransomware-as-a service that first appeared in late June 2021 and is growing in popularity, according to Sophos. The Sophos Rapid Response team has so far seen AvosLocker attacks in the Americas, Middle East and Asia-Pacific, targeting Windows and Linux systems.

Sophos researchers investigating the ransomware deployment found that the main sequence starts with attackers using PDQ Deploy to run and execute a batch script called "love.bat," "update.bat," or "lock.bat" on targeted machines. The script issues and implements a series of consecutive commands that prepare the machines for the release of the ransomware and then reboots into Safe Mode.

The command sequence takes approximately five seconds to execute and includes disabling Windows update services and Windows Defender and then attempting to disable the components of commercial security software solutions that can run in Safe Mode.

Installing the legitimate remote administration tool AnyDesk and setting it to run in Safe Mode while connected to the network, ensuring continued command and control by the attacker and finally setting up a new account with auto login details and then connecting to the target's domain controller to remotely access and run the ransomware executable, called update.exe "The techniques used by AvosLocker are simple, but very clever. They ensure that the ransomware has the best chance of running in Safe Mode and allow the attackers to retain remote access to the machines throughout the attack," Mackenzie added.

—     IANS


Top News

Supreme Court to pronounce order on Arvind Kejriwal's plea today, ED opposes interim bail

Supreme Court likely to pass orders on interim bail to Delhi CM Arvind Kejriwal today

ED opposes it; asserts that the right to campaign in electio...

Pakistan, Russian connections detected in Ahmedabad school bomb threat case

Pakistan, Russian connections detected in Ahmedabad school bomb threat case

The threatening emails received a day before the May 7 Lok S...

India should respect Pak as it has atom bomb, says Congress veteran Mani Shankar Aiyar

BJP's Lok Sabha campaign 'faltering', dredging up old videos: Aiyar on Pakiatan's 'atom bomb' comments

In the video, Aiyar is saying that India should give respect...

Karnataka sex scandal: Twist in case as woman claims was forced to file false case

Karnataka sex scandal: Twist in case as woman claims was forced to file false case

Victims threatened with prostitution by SIT, claims Kumarasw...

Delhi Court to pass order on framing charges against Brij Bhushan Singh today

Delhi Court to pass order on framing charges against Brij Bhushan Singh today

Delhi Police in the chargesheet also submitted several pictu...


Cities

View All