This content is viewable by Everyone

Apr 2025: AnyDesk Control

AnyDesk Phish Indicators

Threat Alert: AnyDesk Control

  • AnyDesk and similar remote monitoring and management (RMM) tools let IT professionals monitor endpoints remotely, but threat actors can exploit their capabilities and trusted status.
  • The attack uses social engineering techniques to manipulate recipients into taking actions that give the attacker access to their devices.
  • Threat actors frequently try to deliver malicious RMM payloads to end users. The social engineering tactics used to access RMM sessions on victim machines in this campaign represent a new threat.
     

How is it used in the wild?

  • Threat actors send emails that appear to come from the recipient’s organization, identifying the sender as “IT Department”, ”IT Security Team”, and “Security Updates.
  • The email pressures recipients to install or update AnyDesk by imposing a false deadline, warning that non-compliance may result in increased security risks.
  • Recipients are prompted to follow step-by-step instructions to recipients to download and install legitimate instances of AnyDesk.
    Following installation, users are directed to provide their unique AnyDesk identifier to an actor-controlled mailbox.
  • If successfully acquired, the unique AnyDesk identifier allows threat actors to access victim endpoints.

Key Action: Stay Alert!

  • Remain alert to phishing indicators, such as mismatches in email signatures, sender information, subject, and attachments.
  • Stay alert for email messages requesting security-related tasks or the installation of software or applications.
  • Exercise the same caution for unique IDs (like AnyDesk or other software) as you would a password or passcode or other credentials. Keep these unique identifiers private.
  • Report ANY suspicious emails via Phish Alarm.