Infected Systems Controlled Through Remote Administration Tools (Detected by EDR)

Infected Systems Controlled Through Remote Administration Tools (Detected by EDR)

Remote administration tools are software for managing and controlling terminals at remote locations. The tools can be used as work-at-home solutions in circumstances such as the COVID-19 pandemic and for the purpose of controlling, managing, and repairing unmanned devices remotely. Such remote control tools used for legitimate purposes are called

Ransomware Attacks Using RDP as the Attack Vector (Detected by EDR)

Ransomware Attacks Using RDP as the Attack Vector (Detected by EDR)

A remote desktop service refers to the feature that allows remote control of other PCs. In Windows, this service is provided by default through Remote Desktop Protocol (RDP). This means that if the target system is a Windows environment, RDP can be used to control this remote target without having

Tracking 3CX Supply Chain Breach Cases using AhnLab EDR

Tracking 3CX Supply Chain Breach Cases using AhnLab EDR

Last March, 3CX supply chain breach cases were a global issue. AhnLab Security Emergency response Center (ASEC) has confirmed through the AhnLab Smart Defense (ASD) infrastructure that malware related to the 3CX supply chain were installed in Korea on March 9th and March 15th. The 3CX supply chain malware confirmed

Tracking the CHM Malware Using EDR

Tracking the CHM Malware Using EDR

AhnLab Security Emergency response Center (ASEC) has shared an APT attack case that has recently used CHM (Compiled HTML Help File). Malware Distributed Disguised as a Password File CHM is a Help screen that is in an HTML format. Threat actors are able to input malicious scrip codes in HTMLs