
Alternatively they may claim to be from a technical support service provider. The scammer will phone you and pretend to be a staff member from a large telecommunications or computer company, such as Telstra, the NBN or Microsoft.

Types of scams Expand submenu for "Types of scams".Download of TeamViewer installer will be at the destination location when sucessfully executed.Īuto_generated_guid: 8ca3b96d-8983-4a7f-b125-fc98cc0a2aa0 Attack Commands: Run with powershell! Elevation Required (e.g. Installation of many remote access tools may also include persistence (ex: the tool's installation routine creates a Windows Service).Īdmin tools such as TeamViewer have been used by several groups targeting institutions in countries of interest to the Russian state and criminal campaigns.(Citation: CrowdStrike 2015 Global Threat Report)(Citation: CrySyS Blog TeamSpy)Ītomic Test #1 - TeamViewer Files Detected Test on WindowsĪtomic Test #2 - AnyDesk Files Detected Test on WindowsĪtomic Test #3 - LogMeIn Files Detected Test on WindowsĪtomic Test #4 - GoToAssist Files Detected Test on WindowsĪtomic Test #5 - ScreenConnect Application Download and Install on WindowsĪtomic Test #6 - Ammyy Admin Software ExecutionĪtomic Test #7 - RemotePC Software ExecutionĪtomic Test #8 - NetSupport - RAT ExecutionĪtomic Test #9 - UltraViewer - RAT ExecutionĪn adversary may attempt to trick the user into downloading teamviewer and using this to maintain access to the machine. They may also be used as a component of malware to establish a reverse connection or back-connect to a service or adversary controlled system. Remote access tools may be installed and used post-compromise as alternate communications channel for redundant access or as a way to establish an interactive remote desktop session with the target system.

Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries.(Citation: Symantec Living off the Land) These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. T1219 - Remote Access Software Description from ATT&CK An adversary may use legitimate desktop support and remote access software, such as Team Viewer, AnyDesk, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks.
