Friday, June 14, 2024

Hackers are Increasingly Using Remote Admin Tools to Control Infected Systems

Recently, there has been a rise in incidences of hackers using “Remote Administration Tools” to control the infected system and bypass protection technologies.

Remote administration tools are software that allows managing and controlling terminals from a remote location. 

The tools can be used for work-from-home purposes as well as remote control, management, and maintenance of unmanned devices. “Remote Administration Tools,” or RATs, are legitimately utilized remote control tools.

“By installing remote administration tools in a target system, the threat actor was able to simultaneously obtain control over the system and bypass anti-malware security products”, AhnLab shared in a report with GBHackers On Security.

Using Remote Administration Tools to Control Infected Systems

AnyDesk is a remote control application with many functions, including file transfer and remote desktop. Remote desktop is a program that allows a user to access and control an environment remotely where RDP or AnyDesk is installed.

In this case, attackers like the Conti ransomware group are known to connect AnyDesk with Cobalt Strike in an attempt to take control of a company’s internal network.

Remote control using AnyDesk
Remote control using AnyDesk

NetSupport is also a remote control program that also offers functions including sharing clipboard contents, taking screenshots, gathering browser history data, managing files, and executing commands.

It doesn’t require an installation process using a standard installer; it can be operated with just the essential internal files. Up until recently, it was disseminated by spam emails that purported to be purchase orders, shipment documents, invoices, or even phishing pages that tricked users into installing it themselves by pretending to be SocGholish software update pages.

NetSupport execution log – EDR detection
NetSupport execution log – EDR detection

Chrome Remote Desktop is a feature that Google provides. The Chrome web browser can be used to operate a system remotely that has the remote desktop program installed and associated with a user account. 

Attacks by the Kimsuky group, which is believed to have North Korean support, are typically carried out to steal technology and confidential data from businesses. To remotely control the compromised system, the group would install malware such as VNC or activate RDP after installing backdoor-type malware.

EDR detection of a suspicious Chrome Remote Desktop execution
EDR detection of a suspicious Chrome Remote Desktop execution

Chrome Remote Desktop has been used to take control of compromised PCs in certain recent situations.

Final Thoughts

AhnLab EDR gathers and provides relevant data, even when users utilize remote administration tools for legitimate remote control reasons. This enables administrators to identify and address suspicious behavior.

Additionally, when suspicious conditions lead to the installation of remote administration tools, these behaviors are recognized as threats, allowing administrators to determine the root cause, take appropriate action, and set up procedures to prevent recurrence.


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles