Hackers impersonate Ukraine’s CERT to trick people into allowing computer access

Avatar

Ukrainian researchers have identified a new cyber campaign in which attackers posed as tech support from Ukraine’s computer emergency response team (CERT-UA) to gain unauthorized access to victims’ devices.

The intruders used AnyDesk, a legitimate remote desktop software, to establish remote access to their computers over the internet, according to CERT-UA’s latest report.

The hackers, whose identities remain unknown, sent connection requests via AnyDesk, claiming they were conducting a “security audit.”

CERT-UA confirmed that, in certain cases, it may use remote access tools like AnyDesk to assist victims in responding to cybersecurity incidents. However, this is done only “with prior agreement and through pre-approved communication channels,” the agency said.

“The attackers are once again using social engineering tactics that rely on trust and exploit authority,” researchers added.

CERT-UA didn’t provide many details about this campaign or the threat actor behind it, but stated that it is likely the victim’s AnyDesk identifier was previously compromised, including on other computers where such remote access was once authorized.

Read More: Russian ransomware hackers increasingly posing as tech support on Microsoft Teams

The hackers, mostly affiliated with Russia, often disguise themselves as Ukrainian state agencies or impersonate official apps and websites to compromise their victims.

In a campaign in December, the Russian state-sponsored threat actor Sandworm targeted Ukrainian soldiers through fraudulent websites that mimicked the official page of a Ukrainian military app.

Earlier last month, suspected Russian hackers targeted Ukrainian military and defense enterprises with phishing emails disguised as invitations to a legitimate defense conference in Kyiv.

The number of cyberattacks targeting Ukraine is growing, according to the latest data. Over the past year, CERT-UA detected more than 4,300 cyber incidents, an increase of nearly 70% compared to the previous year.

The vast majority of incidents involved the spread of malicious software, intrusion attempts and information gathering. The primary initial vector for attacks was the use of compromised accounts and the distribution of malware via email, researchers said.

GovernmentCybercrimeNewsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Mirai Variant Murdoc Botnet Exploits AVTECH IP Cameras and Huawei Routers

Next Post

TSA chief behind cyber directives for aviation, pipelines and rail ousted by Trump team

Related Posts

BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key

BeyondTrust has revealed it completed an investigation into a recent cybersecurity incident that targeted some of the company's Remote Support SaaS instances by making use of a compromised API key. The company said the breach involved 17 Remote Support SaaS customers and that the API key was used to enable unauthorized access by resetting local application passwords. The breach was first flagged
Avatar
Read More

Watch Out For These 8 Cloud Security Shifts in 2025

As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including the increasing reliance on cloud infrastructure for AI-driven workflows and the vast quantities of data being migrated to the cloud. But there are other developments that could impact your organizations and drive the need for an even more robust security strategy. Let’s take a
Avatar
Read More

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to command-and-control (C2) infrastructure and stay under the radar. "ESXi appliances, which are unmonitored, are increasingly exploited as a persistence mechanism and gateway to access corporate networks widely," Sygnia
Avatar
Read More