Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical Security

AnyDesk breach highlights need for remote access vigilance

By Brian Moran
Green digital symbols on screen

Image via Unsplash

February 20, 2024

The recent AnyDesk breach provides a timely reminder to ensure organizations are following best practices regarding remote access software and services — both third-party tools and the features or services embedded in operating systems, browsers and more.

The maker of AnyDesk forced a password reset for all users after it found 18,000 user credentials for sale on the dark web for $15,000. The breach potentially exposed AnyDesk customers’ license keys, a number of active connections, duration of sessions, customer IDs and contact information, email associated with the account, and the total number of hosts that have remote access management software activated.

This breach is yet another reminder of the many threats that organizations face from remote access software and services. In the months leading up to the attack, security research labs observed an uptick in threat activity targeting and abusing these tools and services — and many predict this trend will likely continue through 2024 and beyond.

Remote access tool vs. remote access trojan

IT support teams rely on AnyDesk for remote control, file transfer and VPN functionality. It’s a useful tool to troubleshoot issues, perform maintenance and install patches. Unfortunately, attackers also find huge value in these remote access tools, which serve the same purpose as a remote access trojan.

Like other remote access software, AnyDesk is often used by adversaries to carry out attacks. To take control of a company’s internal network, attackers like the Conti ransomware group are known to connect AnyDesk with Cobalt Strike in an attack attempt.

Attackers use these remote access tools to target users in tech support scams. The attacker impersonates corporate or legitimate software support staff with the goal of convincing users to install or allow the remote access tool. The attacker then takes control of the machine to install malware. Once attackers have achieved a beachhead, they can then use the breached organization’s legitimate remote access tools to blend malicious activity into regular network traffic, making it both easier to spread and more difficult to detect.

External remote services

Similar to remote access software, external remote services are common in operating systems and browsers with services like Windows Remote Desktop Protocol (RDP), Virtual Network Computing (VNC), X11 Forwarding over SSH and XRDP (an open-source implementation of Microsoft's RDP that allows users to graphically control a remote machine with a Linux operating system from a Windows machine using the native Windows RDP client).

Like remote access software, these services are targets for brute force attacks and credential theft. Once inside a network, attackers use RDP or other external remote services to move laterally to other systems, escalate their privileges, and compromise additional resources. Both tools can be incredibly useful for organizations, but in the hands of attackers they represent a significant threat. As attackers refine their tactics, securing them is increasingly critical. 

Remote access best practices

While an organization's IT support team likely won’t let security leaders eliminate all use of remote access tools and external remote services, security teams should familiarize themselves with the following best practices:

Implement application whitelisting: 

Utilize application control solutions like AppLocker to create a whitelist of approved software. By default, block all applications not explicitly approved, ensuring that unauthorized remote control software cannot be installed or run on any system within the network.

Block control servers at the network perimeter: 

Configure the organization's proxy or web gateway to block access to known control servers used by popular remote control software vendors. This step prevents remote control software from connecting to their servers for updates or remote access functionalities.

Integrate alerts into SIEM systems: 

Enhance the Security Information and Event Management (SIEM) system to generate alerts for any attempt to access known remote control servers or when unauthorized software is detected on key systems. This allows for immediate detection and response to potential security incidents.

Monitor and control network traffic: 

Regularly review network traffic logs for any unusual patterns or connections to known remote control servers. Use network segmentation and firewall policies to restrict unnecessary outbound connections.

Educate and train employees: 

Conduct regular security awareness training for all employees to highlight the risks associated with unauthorized remote control software. Educate them on the proper use of approved applications and the importance of following company security policies.

Managed exceptions: 

In cases where the use of specific remote control software is required for legitimate business purposes, establish a controlled process for granting exceptions. This process should include obtaining approval from the IT security team, documenting the justification for the exception, and limiting the software's use to specific devices or users under strict monitoring.

The AnyDesk breach is just one example of many, demonstrating that while IT support teams may think they have their bearings when it comes to understanding their exposure, that often isn’t the case. It’s no longer enough to rely on reactive security measures — a proactive, security validation approach is critical. 



KEYWORDS: best practices cyber attack remote access

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brian moran headshot

Brian Moran is the director of product marketing at Cymulate.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • training-skills-freepik1170x658v536.jpg

    The cybersecurity skills gap highlights the need for cyber-awareness training

    See More
  • Digital COVID passport

    Flight Safety Foundation highlights need for digital health certificates

    See More
  • Growing and Gaining

    Want to Avoid Being Scapegoated For the Next Breach? You Need Total Trust Alongside Zero Trust

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing