AnyDesk Hit by Cyber-Attack and Customer Data Breach – Infosecurity Magazine

Reporter, Infosecurity Magazine
Popular remote desktop software provider AnyDesk has confirmed that its production systems have been compromised following a cyber-attack.
AnyDesk’s systems were breached by adversaries who managed to steal source code and private code signing keys and gain access to the firm’s production systems, the company revealed on Febrary 2.
“We immediately activated a remediation and response plan involving cyber security experts CrowdStrike. The remediation plan has concluded successfully,” AnyDesk said in a public statement.
The firm has revoked all security-related certificates and web portal passwords through maintenance and believes the threat actor is now out of its network.
Spoke w/ AnyDesk on the phone:

1. Confirmed intrusion, but limited impact. IR w/ CrowdStrike & believe TA is out of the network.

2. New code signing certs are on the latest version.

3. No customer data impacted, AnyDesk application is OK, no updates or code tampered with.
The hack was not related to ransomware and AnyDesk found no evidence that any end-user devices had been affected.
“Our systems are designed not to store private keys, security tokens, or passwords that could be exploited to connect to end-user devices.”
“We can confirm that the situation is under control and it is safe to use AnyDesk. Please ensure that you are using the latest version, with the new code signing certificate and that [you] change [your] passwords if the same credentials are used elsewhere,” the company said.
On February 4, two days after AnyDesk’s public statement, cybersecurity firm Resecurity revealed that multiple threat actors are selling compromised AnyDesk login credentials on both the clear and dark web.
“One of these threat actors, going by the alias ‘Jobaaaaa,’ and who had initially registered their forum account in 2021, listed over 18,000 AnyDesk customer credentials for sale on Exploit[.]in, a prominent Dark Web forum,” the Resecurity Hunter team wrote in a report.
According to threat intelligence provider SOS Intelligence, this new breach is likely unrelated to the previous cyber-attack.

“The very likely source of these credentials are end customer compromise via stealer malware rather than the AnyDesk breach. This has been partially confirmed by matching some of the exposed client emails to exact stealer log entries we’ve been able to obtain,” SOS Intelligence said on X.
This was confirmed by Hudson Rock, another threat intelligence provider.
However, Resecurity argued that the timeframe indicates that cybercriminals familiar with the initial incident are hurrying to monetize available customer credentials before AnyDesk customers take proactive measures to reset their credentials.

Notably, the timestamps visible on the screenshots shared by the threat actor with Resecurity show successful unauthorized access dated February 3, which is after AnyDesk said they resolved the incident.
AnyDesk’s maintenance lasted from January 29 to February 1, during this period it was impossible to log in to the AnyDesk’s portal.
“This suggests that many customers have still not changed their access credentials, or this mechanism was still ongoing by the affected parties,” Resecurity wrote.

“By gaining access to the AnyDesk portal, bad threat actors could learn meaningful details about the customers – including but not limited to the used license key, number of active connections, duration of sessions, customer ID and contact information, email associated with the account, and the total number of hosts with remote access management software activated, along with their online or offline status and IDs,” Resecurity added.
Resecurity has shared its findings with AnyDesk.
Resecurity advised all AnyDesk customers to contact the company for further information on their organization's potential impact.
The security firm also recommended the following mitigation measures:

source

Related Posts

After 6 months and little explanation, Norton Healthcare patients, employees still feeling effects of cyber attack – WDRB

Spotty shower possible. Storms after midnight Updated: April 16, 2024 @ 12:31 pmNorton Healthcare, a company serving about 600,000 patients a year with nearly $5 billion in assets, continues to…

Read more

CA's top cybersecurity job has been vacant for almost 2 years – CalMatters

Technology Californians get hacked all the time. The state’s top cybersecurity job is vacant In summaryGov. Newsom has yet to appoint a commander who is tasked with informing businesses and…

Read more

13 Cyber Security Measures Your Small Business Must Take – Tech.co

Our content is funded in part by commercial partnerships, at no extra cost to you and without impact to our editorial impartiality. Click to Learn MoreCybersecurity has been important to…

Read more

AVG Antivirus Free review – Ghacks

AVG AntiVirus Free is a longstanding security program for Microsoft Windows that protects computer systems from viruses, trojans and other malicious code.One interesting fact about AVG is that it maintains…

Read more

Vlog Episode #247: Chris Long on Improving Technical SEO Skills & Playing Offense SEO – Search Engine Roundtable

In part one, we learned about Chris Long and his experience working with Bill Slawski. Then, in part two, we spoke about helping people with SEO on LinkedIn and using…

Read more

Information Security Vs. Cybersecurity: What's The Difference? – Forbes

Information Security Vs. Cybersecurity: What’s The Difference?  Forbessource

Read more

Leave a Reply

Your email address will not be published. Required fields are marked *