Hackers' Use of Remote Administration Tools to Control Systems

Remote administration tools are software that allows managing and controlling terminals from a remote location.
The tools can be used for work-from-home purposes as well as remote control, management, and maintenance of unmanned devices.
AnyDesk is a remote control application with many functions, including file transfer and remote desktop.
Remote desktop is a program that allows a user to access and control an environment remotely where RDP or AnyDesk is installed.
In this case, attackers like the Conti ransomware group are known to connect AnyDesk with Cobalt Strike in an attempt to take control of a company's internal network.
NetSupport is also a remote control program that also offers functions including sharing clipboard contents, taking screenshots, gathering browser history data, managing files, and executing commands.
It doesn't require an installation process using a standard installer; it can be operated with just the essential internal files.
Up until recently, it was disseminated by spam emails that purported to be purchase orders, shipment documents, invoices, or even phishing pages that tricked users into installing it themselves by pretending to be SocGholish software update pages.
Chrome Remote Desktop is a feature that Google provides.
The Chrome web browser can be used to operate a system remotely that has the remote desktop program installed and associated with a user account.
Attacks by the Kimsuky group, which is believed to have North Korean support, are typically carried out to steal technology and confidential data from businesses.
To remotely control the compromised system, the group would install malware such as VNC or activate RDP after installing backdoor-type malware.
Chrome Remote Desktop has been used to take control of compromised PCs in certain recent situations.
AhnLab EDR gathers and provides relevant data, even when users utilize remote administration tools for legitimate remote control reasons.
This enables administrators to identify and address suspicious behavior.
When suspicious conditions lead to the installation of remote administration tools, these behaviors are recognized as threats, allowing administrators to determine the root cause, take appropriate action, and set up procedures to prevent recurrence.


This Cyber News was published on gbhackers.com. Publication date: Fri, 15 Dec 2023 12:43:05 +0000


Cyber News related to Hackers' Use of Remote Administration Tools to Control Systems