What initially appeared to be just normal maintenance activity on Anydesk’s infrastructure was later revealed to actually be a compromise.
AnyDesk has in fact made the situation official in a communication published on February 2 on its institutional website. As specified in the communication, the compromise concerned production servers and the consequence was the need to generate new certificates with which to sign AnyDesk executables.
How to react to this compromise?
As indicated by AnyDesk, it is essential to install the latest available version of the software, signed with the new certificates. From a detection point of view, it’s also important to check whether any compromised versions of AnyDesk may be running in your environments. To do this, you can use the Yara rule made available by Florian Roth, which has already detected a compromised version on VirusTotal.
TeamViewer, the popular remote access software developed by the company of the same name, discovered an irregularity in its internal IT environment on 26 June. They disclosed the potential breach in a statement the following day, stating that they had Read More
On May 21, Veeam published details about four different vulnerabilities detected in their product Veeam Backup Enterprise Manager (VBEM). One of them is critical and allows an unauthenticated attacker to log in to the Veeam Backup Enterprise Manager web interface Read More
SYNLAB, European leader in medical diagnostic services, was the victim of a cyber attack last April. The compromised infrastructure is the one that runs Italians clinics only, other countries were not affected. In early May, ransomware group BlackBasta claimed responsibility Read More
During the last week of April, our Attacker Centric SOC detected multiple new cyber attacker group websites in the Dark Web. Called Dedicated Leak Sites (DLS), they are widely used by ransomware gangs to publish stolen confidential data when the victim Read More
Cisco Talos identified a previously unknown state-sponsored actor behind ArcaneDoor, a sophisticated cyber espionage campaign targeting the perimeter network devices of several vendors. This actor is now tracked as UAT4356 by Talos and STORM-1849 by the Microsoft Threat Intelligence Center. The Read More