Cyber security news for all

More

    AnyDesk Breach: Cybersecurity Measures Urged

    Cybersecurity Breach: AnyDesk Takes Action

    AnyDesk, a prominent provider of remote desktop software, has revealed the occurrence of a cyber breach within its systems, necessitating immediate action.

    Security Incident Uncovered

    Following a rigorous security audit, AnyDesk uncovered the breach within its production systems. It’s noteworthy that this incident is not classified as a ransomware attack. The company has promptly informed the appropriate authorities about the breach.

    Mitigation Steps Implemented

    In response to the breach, AnyDesk swiftly took measures to address the security lapse. All security-related certificates were revoked, and necessary system remediations or replacements were executed. Additionally, the company is in the process of replacing its previous code signing certificate with a new one.

    User Passwords Revoked

    As a precautionary measure, AnyDesk has revoked all passwords associated with its web portal, my.anydesk[.]com. Users are strongly advised to change their passwords, especially if the same credentials are used across multiple online platforms.

    Software Update Encouraged

    To bolster security measures, AnyDesk recommends users to download the latest version of the software, which includes an updated code signing certificate.

    Timeline of Events

    While the exact timing and method of the breach remain undisclosed, AnyDesk is diligently working to ascertain the extent of the intrusion. However, there is currently no evidence to suggest that end-user systems have been compromised.

    Third-Party Disclosures

    Earlier reports by Günter Born highlighted maintenance activities on AnyDesk’s systems starting from January 29, with resolution achieved by February 1. Additionally, previous alerts regarding service disruptions were issued on January 24.

    AnyDesk’s Clientele

    AnyDesk caters to a diverse clientele, boasting over 170,000 customers worldwide, including notable entities like Amedes, AutoForm Engineering, LG Electronics, Samsung Electronics, Spidercam, and Thales.

    Recent Developments

    In a separate incident, cybersecurity firm Resecurity uncovered alarming findings. Two threat actors, including one identified as “Jobaaaaa,” were found advertising a substantial number of AnyDesk customer credentials for sale on Exploit[.]in. These credentials could potentially be exploited for technical support scams and phishing activities.

    Escalation of Concerns

    Resecurity’s investigation revealed the sale of 18,317 accounts for $15,000 in cryptocurrency, with transactions facilitated through an escrow agreement on a cybercrime forum. Moreover, the shared screenshots by the threat actor indicate unauthorized access as recent as February 3, 2024, following the public disclosure of the breach.

    Ongoing Risks

    Despite efforts to mitigate the breach, the possibility remains that some customers have yet to change their access credentials. This underscores the urgency for affected parties to take proactive measures in securing their accounts.

    In conclusion, the AnyDesk breach serves as a stark reminder of the persistent threats posed by cyber adversaries. As the company continues its efforts to reinforce security measures, users are strongly advised to remain vigilant and promptly implement recommended security protocols to safeguard their data and systems against potential risks.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]