{"id":33024,"date":"2024-02-03T00:10:50","date_gmt":"2024-02-02T23:10:50","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=33024"},"modified":"2024-02-20T11:16:38","modified_gmt":"2024-02-20T10:16:38","slug":"anydesk-confirmed-they-have-been-hacked-in-january-2024-production-systems-affected","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/02\/03\/anydesk-confirmed-they-have-been-hacked-in-january-2024-production-systems-affected\/","title":{"rendered":"AnyDesk confirmed, they have been hacked in January 2024, Production systems affected"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/02\/03\/anydesk-wurde-im-januar-2024-gehackt-produktionssysteme-betroffen\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]My fears have been confirmed. The days-long \"maintenance\" of the AnyDesk websites is the result of a cyber attack. AnyDesk's production systems have been hacked. All AnyDesk software must be considered compromised. After the German CERT (BSI) sent out a confidential warning to users of critical infrastructures, I have received finally the incident report from AnyDesk. Below I have put together all the information I now have in one article.<\/p>\n<p><!--more--><\/p>\n<h2>The history of this story<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/b3e5413909154493ab8b254ca8195933\" alt=\"\" width=\"1\" height=\"1\" \/>On January 25, 2024, a reader contacted me and complained about constant \"malfunctions\" with the AnyDesk remote maintenance software. The reader was no longer able to establish a connection from January 20, 2024. In addition, license keys were suddenly no longer accepted. AnyDesk support only stated that there were \"currently problems with the server connections\". Below is a screenshot of a Statement (in German) from the AnyDesk support.<\/p>\n<p><img decoding=\"async\" title=\"AnyDesk-Supportantwort auf St\u00f6rung\" src=\"https:\/\/i.postimg.cc\/0Q65Mh8R\/image.png\" alt=\"AnyDesk-Supportantwort auf St\u00f6rung\" \/><\/p>\n<p>I've covered the case in my German blog post <a href=\"https:\/\/www.borncity.com\/blog\/2024\/01\/25\/strung-bei-anydesk-jemand-betroffen\/\" target=\"_blank\" rel=\"noopener\">St\u00f6rung bei AnyDesk, jemand betroffen?<\/a>, but I wrote not an English version, because I received feedback from my blog readership, that they didn't noticed something. However, the reader mentioned above told me about issues still occuring, and as of January 30, 2024, AnyDesk's website was suddenly in maintenance mode and no longer accessible.<\/p>\n<h3>Who or what is AnyDesk?<\/h3>\n<p>AnyDesk is a provider that offers remote maintenance software under the same name. The product was developed by former TeamViewer employees and was long regarded as an alternative to this product. AnyDesk is used by many companies, with the provider claiming a total of 170,000 customers. Names such as 7-Eleven, Comcast, Samsung, MIT, NVIDIA, SIEMENS and the United Nations are also mentioned. AnyDesk is also integrated into some products.<\/p>\n<h3>First indications of a hack<\/h3>\n<p>Due to a cryptic hint from an anonymous source that AnyDesk should no longer be used in critical environments, I wrote the German blog post <a href=\"https:\/\/www.borncity.com\/blog\/2024\/02\/01\/anydesk-und-die-stoerungen-es-ist-womoeglich-was-im-busch\/\" target=\"_blank\" rel=\"noopener\">AnyDesk und die St\u00f6rungen: Es ist wom\u00f6glich was im Busch<\/a> on February 1, 2024, where I raised the question of a hack.<\/p>\n<p>Later I added the English blog post\u00a0<a href=\"https:\/\/borncity.com\/win\/2024\/02\/02\/anddesk-be-careful-in-using\/\" rel=\"bookmark\">AnyDesk: Be careful in using that remote support software<\/a>.\u00a0Over the last two days, I several \"information fragments\" from various sources have trickled in to tell me that there is something suspicious.<\/p>\n<p>And it turned out that AnyDesk had replaced the certificates used for the digital signing of AnyDesk client version 8.0.8 on January 29, 2024, according to the <a href=\"https:\/\/anydesk.com\/en\/changelog\/windows\" target=\"_blank\" rel=\"noopener\">changelog<\/a>.<\/p>\n<h3>A confidential German CERT (BSI) warning<\/h3>\n<p>What I also found out was that the Federal Office for Information Security (BSI) had sent out a warning to the circle of operators of critical infrastructures this week, but had given it a TLP classification so that only a very small group of people were allowed to view it and not share it under any circumstances. Information on the TLP classification can be found <a href=\"https:\/\/en.wikipedia.org\/wiki\/Traffic_Light_Protocol\" target=\"_blank\" rel=\"noopener\">here<\/a>. According to my information, the document was classified as TLP:AMBER+STRICT &#8211; I still don't know the content &#8211; but I knew that there had been a hack in which keys had been leaked.<\/p>\n<h2>AnyDesk confirms successful cyber attack<\/h2>\n<p>In an \"incident report\" promised by AnyDesk and sent by e-mail a few hours ago, my suspicion that there had been a cyber attack is confirmed. The short incident report is available <a href=\"https:\/\/anydesk.com\/en\/public-statement\" target=\"_blank\" rel=\"noopener\">here<\/a>. AnyDesk confirms that a security check was carried out following indications of an incident in some of its own systems. This revealed evidence of compromised production systems.<\/p>\n<h3>Incident at the end of January 2024?<\/h3>\n<p>The incidence report does not contain any dates, but according to my information, this review was probably initiated on January 29 or 30, 2024, which corresponds to the start of the maintenance phase on January 30, 2024. AnyDesk states that it immediately activated a remediation and response plan involving CrowdStrike's cybersecurity experts.<\/p>\n<h3>Maintenance completed, authorities informed<\/h3>\n<p>The report also states that the remediation plan has been successfully completed. The relevant authorities have been notified and the company is working closely with the authorities. The company denies that this incident is a ransomware infection. This must have led to the above-mentioned BSI warning with the \"TLP:AMBER+STRICT\" block, which underlines the explosive nature of the incident.<\/p>\n<h3>Certificates and passwords revoked<\/h3>\n<p>AnyDesk then revoked all security-relevant certificates and the systems were repaired or replaced where necessary, the report continues. This explains the days-long maintenance mode of the systems. The previous code signing certificate for AnyDesk binaries is now to be revoked shortly, and AnyDesk has already started to replace it with a new one, the provider writes.<\/p>\n<p>This confirms the observation that the AnyDesk client version 8.0.8 from January 29, 2024 was signed with a new certificate. The colleagues from Bleeping Computer, with whom I was still in contact yesterday, have named the old and new certificate used in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/anydesk-says-hackers-breached-its-production-servers-reset-passwords\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>.<\/p>\n<h3>User passwords should be changed<\/h3>\n<p>In the incidence report, AnyDesk writes \"As a precautionary measure, we have revoked all passwords for our web portal my.anydesk.com and recommend that users change their passwords if they use the same login details elsewhere.\" I had already given this advice yesterday here in the blog and advised users to stop using the remote maintenance software for the time being.<\/p>\n<h3>No evidence of exploitation?<\/h3>\n<p>AnyDesk writes about this incident that there are no indications to date that end devices have been affected. They can confirm that the situation is under control and that AnyDesk can be used safely. Users should ensure that they are using the latest version with the new code signing certificate. The integrity and trust in our products is of utmost importance to the provider and we are taking this situation very seriously.<\/p>\n<p>AnyDesk concludes that the systems are designed not to store private keys, security tokens or passwords that could be exploited to connect to end-user devices.<\/p>\n<h2>Final words<\/h2>\n<p>That's the conclusion of AnyDesk's statement, which I received by email at around 10:44 p.m. on February 2, 2024 &#8211; they had been working on them all day, as I had already been promised a meeting with their CEO that morning. When I phoned the German CERT BSI press officer on the morning of February 2, 2024, he didn't even want to confirm when the information would be made public. In Part 2, I would like to present some of the information I have received from various sources and put the whole thing into context.<\/p>\n<p><strong>Articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2024\/02\/03\/anydesk-confirmed-they-have-been-hacked-in-january-2024-production-systems-affected\/\">AnyDesk confirmed, they have been hacked in January 2024, Production systems affected<\/a> &#8211; Part 1<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/03\/anydesk-hack-undercover-more-information-and-thoughts-part-2\/\">AnyDesk hack undercover &#8211; more information and thoughts<\/a> &#8211; Part 2<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/04\/anydesk-hack-undercover-suspicious-cases-and-more-part-3\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack undercover &#8211; Suspicious cases and more<\/a> &#8211; Part 3<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/04\/anydesk-hack-undercover-access-data-offered-for-sale-part-4\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack undercover &#8211; Access data offered for sale<\/a> &#8211; Part 4<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/05\/anydesk-hack-a-review-part-5\/\">AnyDesk hack &#8211; A review<\/a> &#8211; Part 5<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/06\/anydesk-hack-review-of-the-german-cert-bsi-report-part-6\/\">AnyDesk hack &#8211; Review of the German CERT BSI report<\/a> &#8211; Part 6<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/07\/anydesk-hack-notes-on-exchanging-certificates-for-customs-clients-7-x-part-7\/\">AnyDesk hack \u2013 Notes on exchanging certificates for Customs clients 7.x<\/a>\u00a0\u2013 Part 7<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/07\/anydesk-hack-more-details-faq-from-feb-5-2024-part-8\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack &#8211; more details (FAQ from Feb. 5, 2024)<\/a> &#8211; Part 8<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/08\/anydesk-hack-already-noticed-on-december-20-2023-part-9\/\">AnyDesk hack already noticed on December 20, 2023?<\/a> &#8211; Part 9<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/09\/anydesk-hack-confirmed-as-of-december-2023-old-certificate-recalled-part-10\/\">AnyDesk hack confirmed as of December 2023; old certificate recalled<\/a>\u00a0\u2013 Part 10<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/14\/anydesk-hack-revoke-chaos-with-old-certificates-part-11\/\">AnyDesk hack: Revoke chaos with old certificates?<\/a>\u00a0\u2013 Part 11<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/20\/anydesk-hack-newly-signed-clients-availalbe-what-are-your-experiences-part-12\/\">AnyDesk hack: Newly signed clients available; what are your experiences?<\/a>\u00a0\u2013 Part 12<\/p>\n<p><strong>Similar article:<\/strong><br \/>\n<a href=\"https:\/\/www.borncity.com\/blog\/2024\/01\/25\/strung-bei-anydesk-jemand-betroffen\/\">St\u00f6rung bei AnyDesk, jemand betroffen?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/02\/anddesk-be-careful-in-using\/\" rel=\"bookmark\">AnyDesk: Be careful in using that remote support software<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]My fears have been confirmed. The days-long \"maintenance\" of the AnyDesk websites is the result of a cyber attack. AnyDesk's production systems have been hacked. All AnyDesk software must be considered compromised. After the German CERT (BSI) sent out a &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/02\/03\/anydesk-confirmed-they-have-been-hacked-in-january-2024-production-systems-affected\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-33024","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=33024"}],"version-history":[{"count":14,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33024\/revisions"}],"predecessor-version":[{"id":33274,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33024\/revisions\/33274"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=33024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=33024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=33024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}