RATs Increase in Use for Subtle Ransomware Attacks

06 Oct 2025

Exploiting Legitimate Tools for Illicit Purposes

Remote Access Tools, commonly known as RATs, have emerged as invaluable assets for ransomware groups seeking stealth and persistence. Tools such as AnyDesk, Splashtop, UltraViewer, and TightVNC are exploited to execute unauthorized remote sessions within enterprise networks. Typically, attackers gain access by using stolen credentials or brute-forcing against common protocols such as RDP and SMB. With initial access secured, they pivot to hijacking installed RATs or perform clandestine installs, ensuring unmonitored access and control.

Establishing Stealthy Persistence

To establish and maintain deep-rooted persistence, cybercriminals utilize a variety of tactics. They manipulate registry Run keys, create hidden scheduled tasks, and implement covert configuration changes. Escalating their privileges to the powerful SYSTEM level, they neutralize any active antivirus defenses and diligently clear system logs to erase traces of their intrusion. Their ability to move laterally across networks is facilitated using legitimate remote services and ‘living-off-the-land’ binaries, making detection challenging.

Lateral Movement and Payload Delivery

Ransomware payloads are often delivered through these remote access channels, where active sessions allow for the silent introduction of malicious software, effectively bypassing conventional security checks. Indicators that enterprises should remain vigilant for include a series of repeated failed logins followed closely by successful entries, unusual RDP login types or geolocations, the sudden appearance of new or altered run keys, hidden scheduled tasks, and unexpected bulk file operations.

Mapping Attacks and Mitigating Risks

Mapping these sophisticated tactics against frameworks like MITRE ATT&CK helps security teams better understand and visualize the stages of an attack. However, the landscape is evolving rapidly with emerging trends such as AI-driven deployments, cloud-based remote access abuses, and the sinister integration with Ransomware-as-a-Service schemes. Consequently, a robust defense strategy is paramount.

Defense Strategy for Enhanced Security

An effective defense strategy demands a layered approach: application controls to limit unauthorized use of remote tools, antivirus solutions equipped with self-protection capabilities, and behavior-based detection to identify anomalies. Ransomware protection mechanisms that pre-empt unauthorized encryption activities are crucial. Furthermore, strict governance, real-time monitoring, and rapid incident response capabilities are essential to counter these sophisticated threats.

AnyDesk

AnyDesk download for free to PC or mobile

Latest update AnyDesk download for free for Windows PC or Android mobile

4
885 reviews
3190 downloads

News and reviews about AnyDesk

06 Oct 2025

RATs Increase in Use for Subtle Ransomware Attacks

Ransomware groups exploit RATs like AnyDesk, Splashtop, and TightVNC for stealthy control and persistence in networks. Effective defense requires layered security measures and rapid monitoring to counter these threats.

Read more

21 Aug 2024

New Data Extortion Group Mad Liberator Targets AnyDesk Users

A new data extortion group, Mad Liberator, is targeting AnyDesk users with a counterfeit Microsoft Windows update screen to exfiltrate data. This operation, which began in July, diverts victims' attention while siphoning data from OneDrive, network shares, and local storage.

Read more