Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CERT-UA Warns of Phishing via AnyDesk

January 21, 2025
Reading Time: 2 mins read
in Alerts

The Computer Emergency Response Team of Ukraine (CERT-UA) issued a warning regarding ongoing phishing attacks where threat actors impersonate the agency to exploit user trust. These attackers use fraudulent AnyDesk connection requests, claiming to conduct a “security audit” to assess the “level of security” of the target systems. CERT-UA clarified that while the agency may use remote access software like AnyDesk, these actions are only performed through official channels and with prior consent from the owners of the targeted systems. This emphasizes the importance of verifying any remote access requests, especially when they are unsolicited.

The warning underscores the necessity of ensuring that remote access software is only enabled for the duration of its use and is properly coordinated through official communication channels.

For the attack to succeed, the target must have the AnyDesk software installed and operational, and the attacker must possess the target’s AnyDesk identifier. This suggests that the attackers may use other methods to obtain the identifier before attempting the social engineering attack. Organizations should be especially cautious about granting remote access permissions without verification of the request’s authenticity.

The alert from CERT-UA comes as the State Service for Special Communications and Information Protection (SSSCIP) of Ukraine reported over 1,042 cyber incidents in 2024, with over 75% of those involving malicious code and intrusion attempts. The most active cyber threat clusters identified were UAC-0010, UAC-0050, and UAC-0006, known for their involvement in cyber espionage, financial theft, and psychological operations. Notably, UAC-0010, also known as Aqua Blizzard or Gamaredon, was linked to 277 of the reported incidents, demonstrating the high level of activity from these groups in targeting Ukrainian assets.

In parallel, a report revealed that the pro-Russian hacking group GhostWriter, also known as TA445 or UAC-0057, used new .shop top-level domains to support their campaigns against Ukraine. Analysis indicated that the domains were linked to the group’s broader efforts and used common registrars and servers. These findings underscore the increasing complexity and sophistication of cyber-attacks, not only against Ukrainian targets but also involving attacks aimed at Russian entities. These developments highlight the growing role of cyber warfare as part of broader geopolitical conflicts, including the ongoing Russo-Ukrainian war.

Reference:
  • Ukraine’s Computer Emergency Team Warns of Fake AnyDesk Security Audit Requests
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJanuary 2025
ADVERTISEMENT

Related Posts

New Linux Flaws Allow Easy Root Access

New Linux Flaws Allow Easy Root Access

June 18, 2025
New Linux Flaws Allow Easy Root Access

Langflow Flaw Delivers Flodrix DDoS Botnet

June 18, 2025
New Linux Flaws Allow Easy Root Access

Google Fixes GerriScary Supply Chain Flaw

June 18, 2025
Water Curse Group Hits Developers Via GitHub

Water Curse Group Hits Developers Via GitHub

June 17, 2025
Water Curse Group Hits Developers Via GitHub

XDSpy Exploits Windows LNK Zero Day

June 17, 2025
Water Curse Group Hits Developers Via GitHub

CISA Warns Of Apple Zero Click Exploit

June 17, 2025

Latest Alerts

New Linux Flaws Allow Easy Root Access

Google Fixes GerriScary Supply Chain Flaw

Langflow Flaw Delivers Flodrix DDoS Botnet

Water Curse Group Hits Developers Via GitHub

XDSpy Exploits Windows LNK Zero Day

CISA Warns Of Apple Zero Click Exploit

Subscribe to our newsletter

    Latest Incidents

    Scania Insurance Data Stolen In Partner Hack

    Pro Israel Group Claims $81M Nobitex Hack

    Hacker Sells Data Of 1M Cock.li Users

    Zoomcar Data Breach Hits 8.4 Million Users

    Qilin Gang Leaks Asefa FC Barcelona Data

    Gunra Claims 45TB Hack On Colombia Justice

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial