The Mad Liberator ransomware operation, which emerged last month, has quickly gained attention due to its effective use of social engineering techniques and the remote access tool AnyDesk.This article explores how Mad Liberator conducts its attacks and the lessons learned from a detailed analysis by Sophos X-Ops, written by threat researchers Paul Jacobs and Lee Kirkpatrick, which offers practical advice for organizations to defend against similar threats.The attack, which lasted nearly four hours, concluded with the attackers relinquishing control of the device back to the victim.Sophos X-Ops researchers noted that the binary used in the attack was manually triggered, meaning there was no automation in place to re-execute the file once the attackers left the system. As a result, the malicious file remained on the affected system, but it posed no further immediate threat.
Attack Methodology
In one documented case, the attackers used AnyDesk, a legitimate remote desktop software, to gain unauthorized access to an organization’s system. The attack began when the victim approved an AnyDesk connection request, believing it to be part of routine IT activities:- Once the connection was established, Mad Liberator executed a binary designed to emulate a Windows update screen.
- This allowed the attackers to maintain control over the device while they accessed and exfiltrated sensitive data.
- The attackers targeted a linked OneDrive account and centralized server files, using AnyDesk’s FileTransfer facility to steal the data.
- To broaden their reach, they also employed Advanced IP Scanner to identify other devices within the network that could be compromised.




