/pcq/media/media_files/2025/01/21/QOeGfA8HVqA7eVKvi4Rr.png)
CERT-UA ALERT: A Serious Warning
In related news, the Computer Emergency Response Team of Ukraine, or CERT-UA, has issued a warning about new types of online scams in Ukraine. So, scammers say this is just for a very light task of security audit, asking victims to share settings for remote access through AnyDesk. They target two types of people and get into the would-be victim’s device.
CERT-UA noted that remote access apps are used by criminals during legitimate interactions on secure and verified channels. Other organizations have also issued public warnings about such scams which are mostly based on people’s gullibility or false sense of urgency to respond.
How It Is Done?
Scammers send text messages or emails or whatever other forms of communications which relay very shattering truths regarding a very urgent security audit. AnyDesk installation or sharing of access codes with already running systems is done on the commitment of performing a clean-up. Here is where downloading of data, planting malware, or manipulation to remove execution is performed.
For the attack to work, AnyDesk must be open and running on the target's system. Once attached to a victim, an attacker must gain access to that system's AnyDesk ID, which may be accomplished by any means: through phishing software, control malware programs, or whichever other social engineering method.
The general extent of cyber threats
Clearly, this nefarious organization is only part of a larger trend in the cyber threats across Ukraine and the world. According to CERT-UA, there were 1,042 incidents in 2024. Seventy roughly percent of these were between malicious code and intrusion attempts. Cyber threat actors capable and somewhat connected to the campaigns of cyber espionage, financial crime, and psychological war face a multitude of other serious players to be categorized initially as UAC-0010 (Gamaredon), UAC-0050, and UAC-0006.
More adding to the chaos is a pronounced focus on other groups' having attacked Russia in retaliation. This sends a rather strict signal that the tide of cyber warfare now needs bright new integration and change into arrogance with sophistication and an altogether different geopolitical dimension.
In Self Defense: Time-Tested Tell-Tale Peels
CERT-UA advises individuals to do the following:
-
Verify authenticity: a claim for remote access that should be verified with the Original Sender through other lines of communication;
-
Restrict remote access: users must only access the remote servers whenever non-circumventable;
-
Educate the employees: continuing training of personnel to identify phishing attempts and social engineering;
-
Biennial updates: these include multi-factor authentication (MFA), audit logs of suspicious activity created in ciphertext, and software updates.
A Reminder of Remote Access Software’s Dual Edge
At this point, it has become a bit more problematic in that remote-access software allows access coming from anywhere to end up with the computers its owner controls.
AnyDesk has never been controversy-prone, helpful in IT support and telecommute work; still, this is something. Access remains unrestrained; trust must rise; and the user must be educated about the problem.
Evolving Cyber Threats
This CERT-UA alert indicates that change is on the way for the cyber threat landscape. The threat artists use sophisticated techniques; that erode their trust, pressure must be put on individuals and corporate players to be proactive. Disinformation, request validation, and the culture of digital awareness are the antidotes to such scams.
With more scams placed under control, so will a safer cyberspace be born. Cyber threats will never stop; hence, vigilance will be a necessity and not an option.