• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fake anydesk google ads deliver malware

Fake AnyDesk Google ads deliver malware

You are here: Home / General Cyber Security News / Fake AnyDesk Google ads deliver malware
May 28, 2021

Hackers are pushing a bogus variation of a distant desktop application AnyDesk as a result of search success on Google. The phony application contains a trojan that is aspect of a new marketing campaign designed to handle a victim’s pc.

Scientists at CrowdStrike very first spotted the malware final thirty day period. Researchers mentioned the suspicious file masquerading as AnyDesk referred to as “AnyDeskSetup.exe” was currently being composed to disk and exhibiting suspicious habits.

The executable was not a genuine edition but had been weaponized with extra abilities. To evade detection by Google’s advert security, the malware tried to launch a PowerShell script that experienced been renamed rexc.exe to bypass detection.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Scientists reviewed the system and located “AnydeskSetup.exe” operating from the user’s Downloads listing. They stated this was not the ordinary edition of the software, as it was signed by Electronic IT Consultants Furthermore Inc. as an alternative of AnyDesk creators, philandro Software GmbH. The network activity created by the software was to a area (anydeskstat[.]com) registered on April 9, 2021 and hosted at a Russian IP deal with.

When executed, a PowerShell implant was created to %TEMP/v.ps1 and executed with a command-line change of “-W 1” to conceal the PowerShell window. At this issue, researchers launched a complete investigation and identified the PowerShell script the hackers employed was similar to a different piece of malware hiding as a Zoom installer in April.

“The logic we observed is quite similar to logic noticed and published by Inde, wherever a masqueraded Zoom installer dropped a similar PowerShell script from an exterior source,” said scientists.

The malvertising campaign alone sends victims to a URL clone of the reputable AnyDesk web site and provides a download hyperlink for the trojan installer. Researchers discovered three intermediary internet sites utilised in this campaign.

Scientists mentioned the hackers are shelling out $1.75 for each simply click, but this does not equate to having a shell on a focus on they’re intrigued in.

“While it is mysterious what percentage of Google queries for AnyDesk resulted in clicks on the advertisement, a 40% Trojan set up amount from an ad click on shows that this is an incredibly successful method of attaining distant access across a vast array of opportunity targets,” mentioned researchers.

Scientists notified prospects and alerted Google to the malvertising marketing campaign. “It seems that Google expeditiously took ideal motion for the reason that, at the time of this site, the ad was no lengthier remaining served,” researchers claimed.


Some elements of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «building multilayered security for modern threats Building Multilayered Security for Modern Threats
Next Post: Nobelium Phishing Campaign Poses as USAID nobelium phishing campaign poses as usaid»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.