The Computer Emergency Response Team of Ukraine (CERT-UA) issued a warning regarding ongoing phishing attacks where threat actors impersonate the agency to exploit user trust. These attackers use fraudulent AnyDesk connection requests, claiming to conduct a “security audit” to assess the “level of security” of the target systems. CERT-UA clarified that while the agency may use remote access software like AnyDesk, these actions are only performed through official channels and with prior consent from the owners of the targeted systems. This emphasizes the importance of verifying any remote access requests, especially when they are unsolicited.
The warning underscores the necessity of ensuring that remote access software is only enabled for the duration of its use and is properly coordinated through official communication channels.
For the attack to succeed, the target must have the AnyDesk software installed and operational, and the attacker must possess the target’s AnyDesk identifier. This suggests that the attackers may use other methods to obtain the identifier before attempting the social engineering attack. Organizations should be especially cautious about granting remote access permissions without verification of the request’s authenticity.
The alert from CERT-UA comes as the State Service for Special Communications and Information Protection (SSSCIP) of Ukraine reported over 1,042 cyber incidents in 2024, with over 75% of those involving malicious code and intrusion attempts. The most active cyber threat clusters identified were UAC-0010, UAC-0050, and UAC-0006, known for their involvement in cyber espionage, financial theft, and psychological operations. Notably, UAC-0010, also known as Aqua Blizzard or Gamaredon, was linked to 277 of the reported incidents, demonstrating the high level of activity from these groups in targeting Ukrainian assets.
In parallel, a report revealed that the pro-Russian hacking group GhostWriter, also known as TA445 or UAC-0057, used new .shop top-level domains to support their campaigns against Ukraine. Analysis indicated that the domains were linked to the group’s broader efforts and used common registrars and servers. These findings underscore the increasing complexity and sophistication of cyber-attacks, not only against Ukrainian targets but also involving attacks aimed at Russian entities. These developments highlight the growing role of cyber warfare as part of broader geopolitical conflicts, including the ongoing Russo-Ukrainian war.