{"id":33092,"date":"2024-02-08T00:20:03","date_gmt":"2024-02-07T23:20:03","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=33092"},"modified":"2024-02-20T11:18:58","modified_gmt":"2024-02-20T10:18:58","slug":"anydesk-hack-already-noticed-on-december-20-2023-part-9","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/02\/08\/anydesk-hack-already-noticed-on-december-20-2023-part-9\/","title":{"rendered":"AnyDesk hack already noticed on December 20, 2023? &#8211; Part 9"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/02\/07\/anydesk-hack-bereits-zum-20-dezember-2023-bemerkt-teil-9\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]The successful cyberattack on AnyDesk, a provider of remote maintenance software, is making quite a stir. Officially, the incident was confirmed by AnyDesk on February 2, 2024 (specifically Friday evening at 10:44 pm). Almost nothing is known &#8211; neither when, nor what exactly was hacked. I've been working on this topic since January 2024 and an overall picture is emerging from many bits and pieces of information. I now have various sources that indicate that the hack was noticed as early as December 20, 2023. <strong>Addendum:<\/strong> AnyDesk has confirmed my suspicions, see my text below.<\/p>\n<p><!--more--><\/p>\n<h2>No details from AnyDesk<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/e297d4187e394fee93db9210d7e14bbd\" alt=\"\" width=\"1\" height=\"1\" \/>As mentioned above and in my posts at the end of the article, a cyber incident at AnyDesk that affected the production systems has been confirmed since February 2, 2024. I received the press release (Friday night) at 22:44. I have again pulled out the screenshot of the <a href=\"https:\/\/anydesk.com\/en\/public-statement-2-2-2024\" target=\"_blank\" rel=\"noopener\">statement<\/a>:<\/p>\n<p><a href=\"https:\/\/anydesk.com\/en\/public-statement-2-2-2024\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"AnyDesk-Meldung \u00fcber Cybervorfall 2. Februar 2024\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2024\/02\/image-2.png\" alt=\"AnyDesk-Meldung \u00fcber Cybervorfall 2. Februar 2024\" \/><\/a><\/p>\n<p>The announcement says next to nothing. In the article <a href=\"https:\/\/borncity.com\/win\/2024\/02\/03\/anydesk-confirmed-they-have-been-hacked-in-january-2024-production-systems-affected\/\">AnyDesk confirmed, they have been hacked in January 2024, Production systems affected<\/a> \u2013 Part 1 I had compiled some more information that I had. But nothing is known for sure, was my conclusion.<\/p>\n<p>On February 5, an update of AnyDesk was published (see <a href=\"https:\/\/borncity.com\/win\/2024\/02\/07\/anydesk-hack-more-details-faq-from-feb-5-2024-part-8\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack &#8211; more details (FAQ from Feb. 5, 2024)<\/a> &#8211; Part 8), which links to an <a href=\"https:\/\/anydesk.com\/en\/faq-incident\" target=\"_blank\" rel=\"noopener\">FAQ from AnyDesk<\/a>. I had extracted some insights from the FAQ in my linked article.<\/p>\n<p>The company could have com forward and provided more details. Unfortunately, the FAQ again leaves the essential questions (when was what hacked) in connection with the incident unanswered.<\/p>\n<h2>When was the compromise noticed?<\/h2>\n<p>What is striking about the entire story regarding the official announcements by the provider AnyDesk is that there is only ever a minimal admission of what is absolutely necessary. \"Yes, we were hacked\" &#8211; \"we immediately took countermeasures\" &#8211; \"everything is fine again, users can safely use AnyDesk again\".<\/p>\n<p>This may all be true &#8211; but there is a lack of transparency. To this day, we do not officially know when the attack took place, what exactly was compromised and whether private keys and source code were extracted. There are rumors that keys and source code may have been extracted &#8211; but this has not been officially confirmed or denied.<\/p>\n<p>In the post <a href=\"https:\/\/borncity.com\/win\/2024\/02\/07\/anydesk-hack-more-details-faq-from-feb-5-2024-part-8\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack &#8211; more details (FAQ from Feb. 5, 2024)<\/a> &#8211; Part 8, I tried to derive certain findings from the FAQ and explained what was compromised (probably Proyx servers, which was admitted). And even this announcement is open to interpretation and misunderstanding, as the discussion on the post shows.<\/p>\n<p>In the blog post, I also extracted the information from the AnyDesk FAQ, which states that the attack was noticed in mid-January 2024. But there is a suspicion that says an attack was noticed as early as December 20, 2023. My gut feeling told me, based on a reader observation, that something could have already been going on at the end of 2023 for a week now.<\/p>\n<h3>The French ANSSI report<\/h3>\n<p>Yesterday I came across a warning from the French security authority ANSSI (they are the equivalent of the German BSI or US CISA) as part of the preparation of the article <a href=\"https:\/\/borncity.com\/win\/2024\/02\/07\/anydesk-hack-more-details-faq-from-feb-5-2024-part-8\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack &#8211; more details (FAQ from Feb. 5, 2024)<\/a> &#8211; Part 8. In a <a href=\"https:\/\/www.cert.ssi.gouv.fr\/alerte\/CERTFR-2024-ALE-003\/\" target=\"_blank\" rel=\"noopener\">message<\/a> dated February 5, 2024, the French CERT refers to information from German BSI dated January 29, 2024. The publicly accessible message states that the BSI had been notified of a cyber incident at AnyDesk. The following statements in the ANSSI warning are noteworthy:<\/p>\n<ul>\n<li>The source code of the applications developed by the publisher as well as certificates and private keys may have been stolen.<\/li>\n<li>The ANSSI recommends that French users check their systems for the presence of AnyDesk and, if present, look for anomalies dating back to at least December 20, 2023.<\/li>\n<\/ul>\n<p>I have described the details in the linked blog post. It was at this point that I first shuddered when reading the ANSSI report. The authority refers to BSI communications that the German public never got to see (but only a small circle of addressees knows about).<\/p>\n<h3>A second source<\/h3>\n<p>In the meantime, a second source (outside the BSI), who wishes to remain unnamed, has contacted me and confirmed my suspicions. According to the source, there is a non-public document from the BSI (which I do not know, however), which states that AnyDesk probably informed the authority that \"data may have already flowed out\" on December 20, 2023. This information or accusation is now in the air, and only AnyDesk could confirm or deny it and disclose details.<\/p>\n<h2>There are questions upon questions<\/h2>\n<p>I cannot say whether this is true and whether December 20, 2023 was also the day of the compromise, as I do not know the classified BSI documents. For me, this context now explains the BSI's reaction of issuing a warning dated January 29, 2023 to operators of critical infrastructure with the classification TLP AMBER:STRICT, and then on February 5, 2024 (one weekend after the vague confirmation of the hack by AnyDesk) to issue a less meaningful notification to the public.<\/p>\n<p>I had also a statement from the press speaker of German BSI, who told me \"The BSI cannot confirm that it has been aware of the hack since the end of December.\" Might be translated to: The BSI was not informed about the incident by December 20, 2023. It remains unclear when the information about the AnyDesk hack reached the BSI. These \"assumptions\" and the concrete information from the public French ANSSI document give rise to burning questions for me, which I will put into plain language:<\/p>\n<ul>\n<li>When did the attack take place and how long had the attackers been in the system?<\/li>\n<li>How were the attackers able to penetrate the production system and how far did they penetrate, or what was compromised\/extracted?<\/li>\n<li>Have the attackers already been able to access customer systems and gain permanent access?<\/li>\n<\/ul>\n<p>AnyDesk denies the latter in the FAQ, but you can only believe the \"nothing has happened for customers\" statement from AnyDesk GmbH &#8211; or not. But let me put it cautiously: How can a customer decide on the basis of this information whether he can still (safely) use the remote maintenance software? The French ANSS document provides clear instructions for action, which I outlined in the article <a href=\"https:\/\/borncity.com\/win\/2024\/02\/07\/anydesk-hack-more-details-faq-from-feb-5-2024-part-8\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack &#8211; more details (FAQ from Feb. 5, 2024)<\/a> &#8211; Part 8.<\/p>\n<p>The question also arises: What happened from December 20, 2023, when my suspicion of a compromise was confirmed, until the BSI was notified? AnyDesk claims to have investigated and concluded the incident together with CrowdStrike. Then there should be answers to the above questions, which AnyDesk customers should be very interested in.<\/p>\n<p><strong>Addendum:<\/strong> As of February 7, 2024, AnyDesk has updated the <a href=\"https:\/\/anydesk.com\/de\/faq-incident\" target=\"_blank\" rel=\"noopener\">FAQ<\/a> on the incident (I haven't noticed it during translating my German post into English) and added the following note:<\/p>\n<blockquote><p>\"Diligent forensic investigation revealed that the incident had started in late December 2023.\"<\/p><\/blockquote>\n<p>So what I have outlined above (since Feb. 6, 2024 in my German editions) from various sources is now confirmed (thanks to the reader for pointing this out). What remains is the answer to the question raised below as to how the attackers gained access to the system and whether Atlassian was a gateway.<\/p>\n<p>As AnyDesk advertises in its first announcement: \"The integrity and trust in our products is of paramount importance to us and we are taking this situation very seriously. The integrity and trust in the products has definitely been \"cracked\" by the incident, and in my view the disclosure to date is definitely not suitable for restoring \"trust in the provider\".<\/p>\n<h2>More pieces?<\/h2>\n<p>Addendum: There is now further feedback from readers with observations on each article on AnyDesk. In the following <a href=\"https:\/\/www.borncity.com\/blog\/2024\/02\/07\/anydesk-hack-bereits-zum-20-dezember-2023-bemerkt-teil-9\/#comment-172105\" target=\"_blank\" rel=\"noopener\">comment<\/a>, Henry refers to an <a href=\"https:\/\/status.anydesk.com\/incidents\/mnzf7kvnh2p1\" target=\"_blank\" rel=\"noopener\">incident entry<\/a> from December 20, 2023 at AnyDesk (see screenshot below).<\/p>\n<p><a href=\"https:\/\/status.anydesk.com\/incidents\/mnzf7kvnh2p1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2024\/02\/image-6.png\" alt=\"AnyDesk status page incident report\" \/><\/a><\/p>\n<p>There was a global outage of the AnyDesk network for two hours. Of course, there could be many reasons for this, but the coincidence with the above date is striking.<\/p>\n<p>Then there's <a href=\"https:\/\/borncity.com\/win\/2024\/02\/07\/anydesk-hack-more-details-faq-from-feb-5-2024-part-8\/#comment-16716\">a comment<\/a> from a reader who wonders whether there was an intrusion on or before November 9, 2023. I think the reader is alluding to my post <a href=\"https:\/\/borncity.com\/win\/2024\/02\/04\/anydesk-hack-undercover-suspicious-cases-and-more-part-3\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack undercover \u2013 Suspicious cases and more<\/a>\u00a0\u2013 Part 3, where I mentioned a malware sample uploaded to VirusTotal. In the VirusTotal listing, November 9, 2023 is listed as the signature date, for which a certificate from philandro Software GmbH was used. A certificate from this company was also used by AnyDesk and will be recalled soon. But they are probably different certificates.<\/p>\n<p>At this point, however, I noticed that AnyDesk has based its status page on Altassian. At this point, all alarm bells rang for me, because there were several warnings about security vulnerabilities in Altlassian Confluence in October and November 2023. I had reported on this at the end of October 2023 in the German article <a href=\"https:\/\/www.borncity.com\/blog\/2023\/10\/31\/kritische-schwachstelle-cve-2023-22518-in-atlassian-confluence-servern\/\">Kritische Schwachstelle (CVE-2023-22518) in Atlassian Confluence-Servern<\/a>. These are not hard facts, but speculations. But it could be a hint that there is more in the dark. For customers it means that they should check their logs for \"anomalies\" back to mid October 2023. I'm curious to see if a forensics report will ever be made public.<\/p>\n<p><strong>Articles:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/03\/anydesk-confirmed-they-have-been-hacked-in-january-2024-production-systems-affected\/\">AnyDesk confirmed, they have been hacked in January 2024, Production systems affected<\/a>\u00a0\u2013 Part 1<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/03\/anydesk-hack-undercover-more-information-and-thoughts-part-2\/\">AnyDesk hack undercover \u2013 more information and thoughts<\/a>\u00a0\u2013 Part 2<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/04\/anydesk-hack-undercover-suspicious-cases-and-more-part-3\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack undercover \u2013 Suspicious cases and more<\/a>\u00a0\u2013 Part 3<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/04\/anydesk-hack-undercover-access-data-offered-for-sale-part-4\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack undercover \u2013 Access data offered for sale<\/a>\u00a0\u2013 Part 4<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/05\/anydesk-hack-a-review-part-5\/\">AnyDesk hack \u2013 A review<\/a>\u00a0\u2013 Part 5<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/06\/anydesk-hack-review-of-the-german-cert-bsi-report-part-6\/\">AnyDesk hack \u2013 Review of the German CERT BSI report<\/a>\u00a0\u2013 Part 6<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/07\/anydesk-hack-notes-on-exchanging-certificates-for-customs-clients-7-x-part-7\/\">AnyDesk hack \u2013 Notes on exchanging certificates for Customs clients 7.x<\/a>\u00a0\u2013 Part 7<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/07\/anydesk-hack-more-details-faq-from-feb-5-2024-part-8\/\" target=\"_blank\" rel=\"noopener\">AnyDesk hack &#8211; more details (FAQ from Feb. 5, 2024)<\/a> &#8211; Part 8<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/08\/anydesk-hack-already-noticed-on-december-20-2023-part-9\/\">AnyDesk hack already noticed on December 20, 2023?<\/a> &#8211; Part 9<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/09\/anydesk-hack-confirmed-as-of-december-2023-old-certificate-recalled-part-10\/\">AnyDesk hack confirmed as of December 2023; old certificate recalled<\/a>\u00a0\u2013 Part 10<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/14\/anydesk-hack-revoke-chaos-with-old-certificates-part-11\/\">AnyDesk hack: Revoke chaos with old certificates?<\/a>\u00a0\u2013 Part 11<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/20\/anydesk-hack-newly-signed-clients-availalbe-what-are-your-experiences-part-12\/\">AnyDesk hack: Newly signed clients available; what are your experiences?<\/a>\u00a0\u2013 Part 12<\/p>\n<p><strong>Similar article:<\/strong><br \/>\n<a href=\"https:\/\/www.borncity.com\/blog\/2024\/01\/25\/strung-bei-anydesk-jemand-betroffen\/\" target=\"_blank\" rel=\"noopener\">St\u00f6rung bei AnyDesk, jemand betroffen?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/02\/02\/anddesk-be-careful-in-using\/\" rel=\"bookmark\">AnyDesk: Be careful in using that remote support software<\/a><\/p>\n<p><a href=\"https:\/\/www.borncity.com\/blog\/2023\/10\/31\/kritische-schwachstelle-cve-2023-22518-in-atlassian-confluence-servern\/\" target=\"_blank\" rel=\"noopener\">Kritische Schwachstelle (CVE-2023-22518) in Atlassian Confluence-Servern<\/a><br \/>\n<a href=\"https:\/\/www.borncity.com\/blog\/2023\/11\/09\/atlassian-verstrkt-warnung-vor-ausnutzung-der-confluence-schwachstelle-cve-2023-22518\/\" target=\"_blank\" rel=\"bookmark noopener\">Atlassian verst\u00e4rkt Warnung vor Ausnutzung der Confluence-Schwachstelle CVE-2023-22518<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The successful cyberattack on AnyDesk, a provider of remote maintenance software, is making quite a stir. Officially, the incident was confirmed by AnyDesk on February 2, 2024 (specifically Friday evening at 10:44 pm). Almost nothing is known &#8211; neither when, &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/02\/08\/anydesk-hack-already-noticed-on-december-20-2023-part-9\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-33092","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=33092"}],"version-history":[{"count":8,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33092\/revisions"}],"predecessor-version":[{"id":33282,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33092\/revisions\/33282"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=33092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=33092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=33092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}