<\/a><\/figure>\n\n\n\n“The fake Windows Update screen shielded the attacker\u2019s actions from being seen on the victim\u2019s screen. The attack lasted almost four hours, at the conclusion of which the attacker terminated the fake update screen and ended the Anydesk session, giving control of the device back to the victim.” continues the researchers. “We did note that the binary was manually triggered by the attacker; with no scheduled task or automation in place to execute it again once the threat actor was gone, the file simply remained on the affected system.”<\/em><\/p>\n\n\n\n
The attack chain detailed by the researchers emphasizes the need for continuous staff training and clear policies on how IT departments arrange remote sessions. It also recommends that administrators use Anydesk Access Control Lists to restrict connections to specific devices.<\/p>\n\n\n\n
“Ransomware groups rise and fall constantly, and Mad Liberator may prove to be a significant new player, or just another flash in the pan. However, the social-engineering tactics the group used in the case described above are noteworthy \u2013 but they are not unique. Attackers will always continue to develop and employ a variety of tactics to try and exploit both the human element and the technical security layers.” concludes the report.<\/em><\/p>\n\n\n\n