Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Attackers use Microsoft Teams and AnyDesk to deploy DarkGate malware
Global Security

Attackers use Microsoft Teams and AnyDesk to deploy DarkGate malware

AdminBy AdminDecember 17, 2024No Comments4 Mins Read
Microsoft Teams and AnyDesk
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


December 17, 2024Ravi LakshmananMalware / credential theft

Microsoft Teams and AnyDesk

A new social engineering company has used Microsoft Teams as a way to facilitate the deployment of a known malware called DarkGate.

“An attacker used social engineering via a Microsoft Teams challenge to impersonate a user’s client and gain remote access to their system,” Trend Micro researchers Catherine Laveria, Jovit Samaniego and Gabriel Nicoletta said.

“The attacker failed to install the Microsoft Remote Support application, but successfully instructed the victim to download AnyDesk, a tool commonly used for remote access.”

How recently documented By cybersecurity firm Rapid7, the attack involved bombarding a target’s inbox with “thousands of emails,” after which the threat actors contacted them via Microsoft Teams, posing as an employee of an external vendor.

The attacker then instructed the victim to install AnyDesk on their system, after which the remote access was used to deliver several payloads, including a credential stealer and DarkGate malware.

Cyber ​​security

Active in the wild since 2018, DarkGate is a remote access trojan (RAT) that has since evolved into a malware-as-a-service (MaaS) offering with a strictly controlled number of clients. Among its various capabilities are credential theft, keylogging, screen capture, audio recording, and remote desktop.

Analysis of various DarkGate campaigns over the past year shows that it is known to spread through two different attack chains that use the AutoIt and AutoHotKey scripts. In the incident investigated by Trend Micro, the malware was deployed via an AutoIt script.

Although the attack was blocked before any data extortion activity could occur, these findings suggest that threat actors are using a diverse set of initial access routes to distribute malware.

Organizations are encouraged to enable multi-factor authentication (MFA), whitelist approved remote access tools, block unverified applications, and thoroughly vet third-party technical support providers to eliminate the risk of phishing.

DarkGate malware

The development comes amid a surge in various phishing campaigns that use various lures and tricks to trick victims into parting with their data –

  • Large-scale A company focused on YouTube in which bad actors impersonate popular brands and email content creators for potential promotions, partnership offers, and marketing collaborations and encourage them to click on a link to sign an agreement, ultimately leading to the deployment of Lumma Stealer. Email addresses from YouTube channels are extracted using a parser.
  • A liquidation company that uses phishing emails with PDF attachment containing a QR code an attachment that, when scanned, directs users to a fake Microsoft 365 login page to collect credentials.
  • Phishing attacks exploit the trust associated with Cloudflare Pages and Workers to create fake sites that mimic Microsoft 365 login pages and fake CAPTCHA checks to allegedly view or download a document.
  • Phishing attacks that use HTML email attachments that are disguised as legitimate documents, such as invoices or HR policies, but contain embedded JavaScript code to perform malicious actions such as redirecting users to phishing sites, harvesting credentials, and tricking them into executing arbitrary commands under the guise of fixing an error (such as ClickFix ) .
  • Phishing email campaigns that use reliable platforms I like it Docusign, Adobe InDesign and Google Accelerated Mobile Pages (AMP) to get users to click on malicious links that are designed to harvest their credentials.
  • Phishing attempts that purport to come from Okta Support in an attempt to gain access to user credentials and hack into an organization’s systems.
  • Phishing messages targeting Indian users distributed via WhatsApp and instruct recipients to install a malicious banking or utility application on Android devices capable of stealing financial information.
Cyber ​​security

Threat actors are also known to be quick to use global events to their advantage by incorporating them into their phishing campaigns, often hunting for urgency and emotional reactions manipulate victims and induce them to do unintended actions. These efforts are also complemented by event-specific keyword domain registrations.

“High-profile global events, including sporting championships and product launches, attract cybercriminals looking to take advantage of the public interest,” Palo Alto Networks Division 42. said. “These criminals register fraudulent domains impersonating official websites to sell counterfeit goods and offer fraudulent services.”

“By monitoring key metrics such as domain registrations, text patterns, DNS anomalies and change request trends, security teams can detect and mitigate threats in a timely manner.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025

67 Trojanized GitHub repository found in the company, orientation on gamers and developers

June 20, 2025

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Iran’s state TV is driven in the middle of his brother amid geopolitical tensions; 90 million dollars stole in the cry

June 20, 2025

A massive DDOS attack 7.3 TBPS provides 37.4 TV in 45 seconds, focusing on the hosting provider

June 20, 2025

6 Steps to 24/7 Internal Success SoC

June 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.